First published: Tue May 06 2025(Updated: )
Important: kpatch-patch-5_14_0-503_15_1 and kpatch-patch-5_14_0-503_26_1 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
redhat/kpatch-patch | <5_14_0-503_15_1-1-4.el9_5 | 5_14_0-503_15_1-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-1-3.el9_5 | 5_14_0-503_26_1-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-1-4.el9_5 | 5_14_0-503_15_1-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-debuginfo-1-4.el9_5 | 5_14_0-503_15_1-debuginfo-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-debugsource-1-4.el9_5 | 5_14_0-503_15_1-debugsource-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-1-3.el9_5 | 5_14_0-503_26_1-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-debuginfo-1-3.el9_5 | 5_14_0-503_26_1-debuginfo-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-debugsource-1-3.el9_5 | 5_14_0-503_26_1-debugsource-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-1-4.el9_5 | 5_14_0-503_15_1-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-debuginfo-1-4.el9_5 | 5_14_0-503_15_1-debuginfo-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_15_1-debugsource-1-4.el9_5 | 5_14_0-503_15_1-debugsource-1-4.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-1-3.el9_5 | 5_14_0-503_26_1-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-debuginfo-1-3.el9_5 | 5_14_0-503_26_1-debuginfo-1-3.el9_5 |
redhat/kpatch-patch | <5_14_0-503_26_1-debugsource-1-3.el9_5 | 5_14_0-503_26_1-debugsource-1-3.el9_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:4499 is classified as important.
You can fix RHSA-2025:4499 by updating to the latest kpatch-patch versions 5_14_0-503_15_1-1-4.el9_5 or 5_14_0-503_26_1-1-3.el9_5.
RHSA-2025:4499 affects Red Hat Enterprise Linux for x86_64 and Power, little endian on the specified kernel version.
The kpatch-patch module allows for live patching of the running kernel to address security vulnerabilities.
Yes, RHSA-2025:4499 includes multiple package types such as kpatch-patch, debuginfo, and debugsource.