First published: Thu Mar 20 2025(Updated: )
Important: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-477_43_1-1-8.el8_8 | 4_18_0-477_43_1-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-1-5.el8_8 | 4_18_0-477_67_1-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-1-3.el8_8 | 4_18_0-477_81_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-1-1.el8_8 | 4_18_0-477_89_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-1-8.el8_8 | 4_18_0-477_43_1-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-debuginfo-1-8.el8_8 | 4_18_0-477_43_1-debuginfo-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-debugsource-1-8.el8_8 | 4_18_0-477_43_1-debugsource-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-1-5.el8_8 | 4_18_0-477_67_1-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-debuginfo-1-5.el8_8 | 4_18_0-477_67_1-debuginfo-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-debugsource-1-5.el8_8 | 4_18_0-477_67_1-debugsource-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-1-3.el8_8 | 4_18_0-477_81_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-debuginfo-1-3.el8_8 | 4_18_0-477_81_1-debuginfo-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-debugsource-1-3.el8_8 | 4_18_0-477_81_1-debugsource-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-1-1.el8_8 | 4_18_0-477_89_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-debuginfo-1-1.el8_8 | 4_18_0-477_89_1-debuginfo-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-debugsource-1-1.el8_8 | 4_18_0-477_89_1-debugsource-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-1-8.el8_8 | 4_18_0-477_43_1-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-debuginfo-1-8.el8_8 | 4_18_0-477_43_1-debuginfo-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_43_1-debugsource-1-8.el8_8 | 4_18_0-477_43_1-debugsource-1-8.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-1-5.el8_8 | 4_18_0-477_67_1-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-debuginfo-1-5.el8_8 | 4_18_0-477_67_1-debuginfo-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_67_1-debugsource-1-5.el8_8 | 4_18_0-477_67_1-debugsource-1-5.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-1-3.el8_8 | 4_18_0-477_81_1-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-debuginfo-1-3.el8_8 | 4_18_0-477_81_1-debuginfo-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_81_1-debugsource-1-3.el8_8 | 4_18_0-477_81_1-debugsource-1-3.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-1-1.el8_8 | 4_18_0-477_89_1-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-debuginfo-1-1.el8_8 | 4_18_0-477_89_1-debuginfo-1-1.el8_8 |
redhat/kpatch-patch | <4_18_0-477_89_1-debugsource-1-1.el8_8 | 4_18_0-477_89_1-debugsource-1-1.el8_8 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3094 is classified as Important.
To fix RHSA-2025:3094, you need to apply the relevant kpatch-patch updates specified in the advisory.
The affected versions include kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1.
Products impacted by RHSA-2025:3094 include Red Hat Enterprise Linux for x86_64 and Red Hat Enterprise Linux for Power, little endian.
Yes, there are kernel live patch modules available for RHSA-2025:3094 that can be applied using the kpatch command line utility.