First published: Thu Mar 20 2025(Updated: )
Important: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, kpatch-patch-5_14_0-427_44_1, and kpatch-patch-5_14_0-427_55_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <5_14_0-427_13_1-1-7.el9_4 | 5_14_0-427_13_1-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-1-5.el9_4 | 5_14_0-427_31_1-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-1-3.el9_4 | 5_14_0-427_44_1-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-1-1.el9_4 | 5_14_0-427_55_1-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-1-7.el9_4 | 5_14_0-427_13_1-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-debuginfo-1-7.el9_4 | 5_14_0-427_13_1-debuginfo-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-debugsource-1-7.el9_4 | 5_14_0-427_13_1-debugsource-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-1-5.el9_4 | 5_14_0-427_31_1-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-debuginfo-1-5.el9_4 | 5_14_0-427_31_1-debuginfo-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-debugsource-1-5.el9_4 | 5_14_0-427_31_1-debugsource-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-1-3.el9_4 | 5_14_0-427_44_1-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-debuginfo-1-3.el9_4 | 5_14_0-427_44_1-debuginfo-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-debugsource-1-3.el9_4 | 5_14_0-427_44_1-debugsource-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-1-1.el9_4 | 5_14_0-427_55_1-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-debuginfo-1-1.el9_4 | 5_14_0-427_55_1-debuginfo-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-debugsource-1-1.el9_4 | 5_14_0-427_55_1-debugsource-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-1-7.el9_4 | 5_14_0-427_13_1-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-debuginfo-1-7.el9_4 | 5_14_0-427_13_1-debuginfo-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_13_1-debugsource-1-7.el9_4 | 5_14_0-427_13_1-debugsource-1-7.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-1-5.el9_4 | 5_14_0-427_31_1-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-debuginfo-1-5.el9_4 | 5_14_0-427_31_1-debuginfo-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_31_1-debugsource-1-5.el9_4 | 5_14_0-427_31_1-debugsource-1-5.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-1-3.el9_4 | 5_14_0-427_44_1-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-debuginfo-1-3.el9_4 | 5_14_0-427_44_1-debuginfo-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_44_1-debugsource-1-3.el9_4 | 5_14_0-427_44_1-debugsource-1-3.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-1-1.el9_4 | 5_14_0-427_55_1-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-debuginfo-1-1.el9_4 | 5_14_0-427_55_1-debuginfo-1-1.el9_4 |
redhat/kpatch-patch | <5_14_0-427_55_1-debugsource-1-1.el9_4 | 5_14_0-427_55_1-debugsource-1-1.el9_4 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2025:3097 is classified as an important security update.
To fix RHSA-2025:3097, you should update your kpatch-patch packages to the recommended versions provided in the advisory.
The vulnerability in RHSA-2025:3097 allows for modification of a running kernel which may lead to various system risks.
RHSA-2025:3097 affects multiple versions of the kpatch-patch package across different architectures.
You can verify the system's kpatch-patch package version against the affected versions listed in the advisory.