First published: Tue Apr 16 2024(Updated: )
Important: kernel security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-abi-whitelists | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug-devel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-devel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-doc | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-firmware | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-headers | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/perf | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/perf-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/python-perf | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debug | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-devel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-headers | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/perf | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/python-perf | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-kdump | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-754.53.1.el6 | 2.6.32-754.53.1.el6 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) | ||
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1831 is categorized as Important.
To fix RHSA-2024:1831, you need to update the kernel package to version 2.6.32-754.53.1.el6.
RHSA-2024:1831 affects various versions of Red Hat Enterprise Linux Server, including those on Extended Life Cycle Support and Retired Extended Life Cycle Support.
RHSA-2024:1831 addresses an out-of-bounds write vulnerability in the qfq_change_class function, identified as CVE-2023-31436.
Yes, RHSA-2024:1831 includes a security update for the kernel package.