First published: Thu Mar 20 2025(Updated: )
Important: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_52_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <5_14_0-284_104_1-1-1.el9_2 | 5_14_0-284_104_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-1-9.el9_2 | 5_14_0-284_52_1-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-1-5.el9_2 | 5_14_0-284_79_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-1-3.el9_2 | 5_14_0-284_92_1-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-1-1.el9_2 | 5_14_0-284_104_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-debuginfo-1-1.el9_2 | 5_14_0-284_104_1-debuginfo-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-debugsource-1-1.el9_2 | 5_14_0-284_104_1-debugsource-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-1-9.el9_2 | 5_14_0-284_52_1-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-debuginfo-1-9.el9_2 | 5_14_0-284_52_1-debuginfo-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-debugsource-1-9.el9_2 | 5_14_0-284_52_1-debugsource-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-1-5.el9_2 | 5_14_0-284_79_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-debuginfo-1-5.el9_2 | 5_14_0-284_79_1-debuginfo-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-debugsource-1-5.el9_2 | 5_14_0-284_79_1-debugsource-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-1-3.el9_2 | 5_14_0-284_92_1-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-debuginfo-1-3.el9_2 | 5_14_0-284_92_1-debuginfo-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-debugsource-1-3.el9_2 | 5_14_0-284_92_1-debugsource-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-1-1.el9_2 | 5_14_0-284_104_1-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-debuginfo-1-1.el9_2 | 5_14_0-284_104_1-debuginfo-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_104_1-debugsource-1-1.el9_2 | 5_14_0-284_104_1-debugsource-1-1.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-1-9.el9_2 | 5_14_0-284_52_1-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-debuginfo-1-9.el9_2 | 5_14_0-284_52_1-debuginfo-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_52_1-debugsource-1-9.el9_2 | 5_14_0-284_52_1-debugsource-1-9.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-1-5.el9_2 | 5_14_0-284_79_1-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-debuginfo-1-5.el9_2 | 5_14_0-284_79_1-debuginfo-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_79_1-debugsource-1-5.el9_2 | 5_14_0-284_79_1-debugsource-1-5.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-1-3.el9_2 | 5_14_0-284_92_1-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-debuginfo-1-3.el9_2 | 5_14_0-284_92_1-debuginfo-1-3.el9_2 |
redhat/kpatch-patch | <5_14_0-284_92_1-debugsource-1-3.el9_2 | 5_14_0-284_92_1-debugsource-1-3.el9_2 |
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3096 is classified as important.
To fix RHSA-2025:3096, you should update the kpatch-patch packages to the recommended versions provided by Red Hat.
RHSA-2025:3096 affects various versions of the kpatch-patch package on Red Hat Enterprise Linux systems.
Systems running specific versions of Red Hat Enterprise Linux, including x86_64 and Power LE architecture, are vulnerable due to RHSA-2025:3096.
There is no specified workaround for RHSA-2025:3096; updating the affected packages is the recommended action.