First published: Thu Mar 20 2025(Updated: )
Important: kpatch-patch-4_18_0-372_118_1, kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, and kpatch-patch-4_18_0-372_91_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <4_18_0-372_118_1-1-5.el8_6 | 4_18_0-372_118_1-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-1-4.el8_6 | 4_18_0-372_131_1-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-1-1.el8_6 | 4_18_0-372_137_1-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-1-9.el8_6 | 4_18_0-372_91_1-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-1-5.el8_6 | 4_18_0-372_118_1-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-debuginfo-1-5.el8_6 | 4_18_0-372_118_1-debuginfo-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-debugsource-1-5.el8_6 | 4_18_0-372_118_1-debugsource-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-1-4.el8_6 | 4_18_0-372_131_1-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-debuginfo-1-4.el8_6 | 4_18_0-372_131_1-debuginfo-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-debugsource-1-4.el8_6 | 4_18_0-372_131_1-debugsource-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-1-1.el8_6 | 4_18_0-372_137_1-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-debuginfo-1-1.el8_6 | 4_18_0-372_137_1-debuginfo-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-debugsource-1-1.el8_6 | 4_18_0-372_137_1-debugsource-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-1-9.el8_6 | 4_18_0-372_91_1-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-debuginfo-1-9.el8_6 | 4_18_0-372_91_1-debuginfo-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-debugsource-1-9.el8_6 | 4_18_0-372_91_1-debugsource-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-1-5.el8_6 | 4_18_0-372_118_1-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-debuginfo-1-5.el8_6 | 4_18_0-372_118_1-debuginfo-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_118_1-debugsource-1-5.el8_6 | 4_18_0-372_118_1-debugsource-1-5.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-1-4.el8_6 | 4_18_0-372_131_1-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-debuginfo-1-4.el8_6 | 4_18_0-372_131_1-debuginfo-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_131_1-debugsource-1-4.el8_6 | 4_18_0-372_131_1-debugsource-1-4.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-1-1.el8_6 | 4_18_0-372_137_1-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-debuginfo-1-1.el8_6 | 4_18_0-372_137_1-debuginfo-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_137_1-debugsource-1-1.el8_6 | 4_18_0-372_137_1-debugsource-1-1.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-1-9.el8_6 | 4_18_0-372_91_1-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-debuginfo-1-9.el8_6 | 4_18_0-372_91_1-debuginfo-1-9.el8_6 |
redhat/kpatch-patch | <4_18_0-372_91_1-debugsource-1-9.el8_6 | 4_18_0-372_91_1-debugsource-1-9.el8_6 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3095 is classified as Important.
To fix RHSA-2025:3095, you should update to the recommended kpatch-patch versions listed in the advisory.
RHSA-2025:3095 affects Red Hat Enterprise Linux systems utilizing the kpatch-patch component.
RHSA-2025:3095 implements security updates via kernel live patch modules that can modify the running kernel code.
Versions impacted by RHSA-2025:3095 include kpatch-patch 4_18_0-372_118_1, 4_18_0-372_131_1, 4_18_0-372_137_1, and 4_18_0-372_91_1.