First published: Wed Mar 13 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <3_10_0-1160_102_1-1-3.el7 | 3_10_0-1160_102_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-2.el7 | 3_10_0-1160_105_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-1.el7 | 3_10_0-1160_108_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-4.el7 | 3_10_0-1160_99_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-3.el7 | 3_10_0-1160_102_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-3.el7 | 3_10_0-1160_102_1-debuginfo-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-2.el7 | 3_10_0-1160_105_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-2.el7 | 3_10_0-1160_105_1-debuginfo-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-1.el7 | 3_10_0-1160_108_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-debuginfo-1-1.el7 | 3_10_0-1160_108_1-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-4.el7 | 3_10_0-1160_99_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-debuginfo-1-4.el7 | 3_10_0-1160_99_1-debuginfo-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-3.el7 | 3_10_0-1160_102_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-3.el7 | 3_10_0-1160_102_1-debuginfo-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-2.el7 | 3_10_0-1160_105_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-2.el7 | 3_10_0-1160_105_1-debuginfo-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-1.el7 | 3_10_0-1160_108_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-debuginfo-1-1.el7 | 3_10_0-1160_108_1-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-1-4.el7 | 3_10_0-1160_99_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_99_1-debuginfo-1-4.el7 | 3_10_0-1160_99_1-debuginfo-1-4.el7 |
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1323 is classified as important due to its impact on kernel performance and security.
To fix RHSA-2024:1323, you need to apply the kpatch-patch updates available for your specific version of Red Hat Enterprise Linux.
RHSA-2024:1323 affects the kpatch-patch module on Red Hat Enterprise Linux Server versions including 3_10_0-1160_99, 3_10_0-1160_102, 3_10_0-1160_105, and 3_10_0-1160_108.
RHSA-2024:1323 addresses a use-after-free vulnerability in the sch_qfq network scheduler, identified by CVE-2023-4921.
No, applying the kpatch-patch updates for RHSA-2024:1323 does not require a system restart as it is a live patch module.