First published: Tue Apr 23 2024(Updated: )
Important: kpatch-patch security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <3_10_0-1160_102_1-1-4.el7 | 3_10_0-1160_102_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-3.el7 | 3_10_0-1160_105_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-2.el7 | 3_10_0-1160_108_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-4.el7 | 3_10_0-1160_102_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-4.el7 | 3_10_0-1160_102_1-debuginfo-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-3.el7 | 3_10_0-1160_105_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-3.el7 | 3_10_0-1160_105_1-debuginfo-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-2.el7 | 3_10_0-1160_108_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-debuginfo-1-2.el7 | 3_10_0-1160_108_1-debuginfo-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-1-4.el7 | 3_10_0-1160_102_1-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_102_1-debuginfo-1-4.el7 | 3_10_0-1160_102_1-debuginfo-1-4.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-1-3.el7 | 3_10_0-1160_105_1-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_105_1-debuginfo-1-3.el7 | 3_10_0-1160_105_1-debuginfo-1-3.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-1-2.el7 | 3_10_0-1160_108_1-1-2.el7 |
redhat/kpatch-patch | <3_10_0-1160_108_1-debuginfo-1-2.el7 | 3_10_0-1160_108_1-debuginfo-1-2.el7 |
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1960 is classified as Important.
RHSA-2024:1960 addresses a use-after-free vulnerability in unix_stream_sendpage identified as CVE-2023-4622.
To fix RHSA-2024:1960, update the 'kpatch-patch' package to the specified remedial versions listed in the advisory.
Affected versions of kpatch-patch include 3_10_0-1160_102_1-1-4.el7, 3_10_0-1160_105_1-1-3.el7, and 3_10_0-1160_108_1-1-2.el7.
RHSA-2024:1960 specifically applies to Red Hat Enterprise Linux Server versions that utilize the affected kpatch-patch packages.