First published: Thu Mar 20 2025(Updated: )
Important: kpatch-patch-4_18_0-305_120_1, kpatch-patch-4_18_0-305_138_1, kpatch-patch-4_18_0-305_145_1, and kpatch-patch-4_18_0-305_150_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-305_120_1-1-9.el8_4 | 4_18_0-305_120_1-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-1-5.el8_4 | 4_18_0-305_138_1-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-1-3.el8_4 | 4_18_0-305_145_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-1-1.el8_4 | 4_18_0-305_150_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-1-9.el8_4 | 4_18_0-305_120_1-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-debuginfo-1-9.el8_4 | 4_18_0-305_120_1-debuginfo-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-debugsource-1-9.el8_4 | 4_18_0-305_120_1-debugsource-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-1-5.el8_4 | 4_18_0-305_138_1-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-debuginfo-1-5.el8_4 | 4_18_0-305_138_1-debuginfo-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-debugsource-1-5.el8_4 | 4_18_0-305_138_1-debugsource-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-1-3.el8_4 | 4_18_0-305_145_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-debuginfo-1-3.el8_4 | 4_18_0-305_145_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-debugsource-1-3.el8_4 | 4_18_0-305_145_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-1-1.el8_4 | 4_18_0-305_150_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-debuginfo-1-1.el8_4 | 4_18_0-305_150_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-debugsource-1-1.el8_4 | 4_18_0-305_150_1-debugsource-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-1-9.el8_4 | 4_18_0-305_120_1-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-debuginfo-1-9.el8_4 | 4_18_0-305_120_1-debuginfo-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_120_1-debugsource-1-9.el8_4 | 4_18_0-305_120_1-debugsource-1-9.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-1-5.el8_4 | 4_18_0-305_138_1-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-debuginfo-1-5.el8_4 | 4_18_0-305_138_1-debuginfo-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_138_1-debugsource-1-5.el8_4 | 4_18_0-305_138_1-debugsource-1-5.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-1-3.el8_4 | 4_18_0-305_145_1-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-debuginfo-1-3.el8_4 | 4_18_0-305_145_1-debuginfo-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_145_1-debugsource-1-3.el8_4 | 4_18_0-305_145_1-debugsource-1-3.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-1-1.el8_4 | 4_18_0-305_150_1-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-debuginfo-1-1.el8_4 | 4_18_0-305_150_1-debuginfo-1-1.el8_4 |
redhat/kpatch-patch | <4_18_0-305_150_1-debugsource-1-1.el8_4 | 4_18_0-305_150_1-debugsource-1-1.el8_4 |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3093 is categorized as important.
To fix RHSA-2025:3093, you should update to the latest kpatch-patch versions specified in the advisory.
RHSA-2025:3093 affects various versions of the kpatch-patch package on Red Hat Enterprise Linux.
No specific workarounds are provided for RHSA-2025:3093, applying the patch is the recommended solution.
Yes, RHSA-2025:3093 addresses vulnerabilities in the kernel that can be mitigated through live patching.