First published: Tue Jan 30 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-305_103_1-1-3.el8_4 | 4_18_0-305_103_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-1-2.el8_4 | 4_18_0-305_108_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-1-1.el8_4 | 4_18_0-305_114_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-1-4.el8_4 | 4_18_0-305_97_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-1-3.el8_4 | 4_18_0-305_103_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-debuginfo-1-3.el8_4 | 4_18_0-305_103_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-debugsource-1-3.el8_4 | 4_18_0-305_103_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-1-2.el8_4 | 4_18_0-305_108_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-debuginfo-1-2.el8_4 | 4_18_0-305_108_1-debuginfo-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-debugsource-1-2.el8_4 | 4_18_0-305_108_1-debugsource-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-1-1.el8_4 | 4_18_0-305_114_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-debuginfo-1-1.el8_4 | 4_18_0-305_114_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-debugsource-1-1.el8_4 | 4_18_0-305_114_1-debugsource-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-1-4.el8_4 | 4_18_0-305_97_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-debuginfo-1-4.el8_4 | 4_18_0-305_97_1-debuginfo-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-debugsource-1-4.el8_4 | 4_18_0-305_97_1-debugsource-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-1-3.el8_4 | 4_18_0-305_103_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-debuginfo-1-3.el8_4 | 4_18_0-305_103_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_103_1-debugsource-1-3.el8_4 | 4_18_0-305_103_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-1-2.el8_4 | 4_18_0-305_108_1-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-debuginfo-1-2.el8_4 | 4_18_0-305_108_1-debuginfo-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_108_1-debugsource-1-2.el8_4 | 4_18_0-305_108_1-debugsource-1-2.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-1-1.el8_4 | 4_18_0-305_114_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-debuginfo-1-1.el8_4 | 4_18_0-305_114_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_114_1-debugsource-1-1.el8_4 | 4_18_0-305_114_1-debugsource-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-1-4.el8_4 | 4_18_0-305_97_1-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-debuginfo-1-4.el8_4 | 4_18_0-305_97_1-debuginfo-1-4.el8_4 |
redhat/kpatch-patch | <4_18_0-305_97_1-debugsource-1-4.el8_4 | 4_18_0-305_97_1-debugsource-1-4.el8_4 |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0593 is classified as important.
You can fix RHSA-2024:0593 by updating the kpatch-patch package to one of the specified remedial versions.
RHSA-2024:0593 affects various editions of Red Hat Enterprise Linux, including x86_64 and Power LE systems.
RHSA-2024:0593 addresses a vulnerability related to incorrect verifier pruning in the kernel's BPF.
Yes, the specific versions of kpatch-patch that address RHSA-2024:0593 include 4_18_0-305_97_1-1-4.el8_4, 4_18_0-305_103_1-1-3.el8_4, 4_18_0-305_108_1-1-2.el8_4, and 4_18_0-305_114_1-1-1.el8_4.