First published: Wed Oct 30 2024(Updated: )
Moderate: kernel security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/bpftool | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/bpftool-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-abi-stablelists | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-core | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-cross-headers | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-core | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-devel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-modules | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-modules-extra | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-devel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-doc | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-headers | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-modules | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-modules-extra | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools-libs | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/perf | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/perf-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/python3-perf | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/python3-perf-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/bpftool | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/bpftool-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-core | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-cross-headers | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-core | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-devel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-modules | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debug-modules-extra | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-debuginfo-common-ppc64le | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-devel | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-headers | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-modules | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-modules-extra | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/kernel-tools-libs | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/perf | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/perf-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/python3-perf | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
redhat/python3-perf-debuginfo | <4.18.0-372.127.1.el8_6 | 4.18.0-372.127.1.el8_6 |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:8616 is classified as moderate.
To fix RHSA-2024:8616, update the affected kernel packages to version 4.18.0-372.127.1.el8_6.
RHSA-2024:8616 addresses vulnerabilities including CVE-2024-40998 related to uninitialized access in the ext4 file system.
Affected products include Red Hat Enterprise Linux Server and Update Services for SAP Solutions among others.
Yes, a restart is recommended after applying the kernel update to ensure all changes take effect.