First published: Mon May 05 2025(Updated: )
Moderate: xmlrpc-c security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
redhat/xmlrpc-c | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-apps-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-apps-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debugsource | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debugsource | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-apps-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-client-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debuginfo | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
redhat/xmlrpc-c-debugsource | <1.51.0-5.el8_4.2 | 1.51.0-5.el8_4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:4448 is categorized as moderate.
To fix RHSA-2025:4448, update the xmlrpc-c packages to version 1.51.0-5.el8_4.2.
RHSA-2025:4448 affects multiple Red Hat Enterprise Linux products including the Server and SAP Solutions editions.
Yes, the specific package version required to address RHSA-2025:4448 is 1.51.0-5.el8_4.2.
xmlrpc-c is a remote procedure call protocol that is being updated due to security vulnerabilities noted in RHSA-2025:4448.