Kernel Live Patch life cycles
Updated
This document tracks the life cycle of kernel live patches, which CVEs the patches address, and their release date.
For more information on which Red Hat Enterprise Linux versions have access to kernel live patching, see the [Is live kernel patch (kpatch) supported in Red Hat Enterprise Linux ?](https://access.redhat.com/solutions/2206511) solution.
For more information about the kernel live patching solution and how it works in Red Hat Enterprise Linux 7, see Applying patches with kernel live patching in the Kernel administration guide or refer to the release note notation.
To see documentation about kernel live patching solution for Red Hat Enterprise Linux 8, refer to Applying patches with kernel live patching in Managing, monitoring and updating the kernel or refer to the release note notation.
Note - For information on Kernel Live Patching changes, please see the Kernel Live Patch Support Cadence Update doc.
Red Hat Enterprise Linux 8.6
kernel-4.18.0-372.131.1
| Kpatch package | kpatch-patch-4_18_0-372_131_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:16580-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-372.137.1
| Kpatch package | kpatch-patch-4_18_0-372_137_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:16580-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-372.145.1
| Kpatch package | kpatch-patch-4_18_0-372_145_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:16580-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-372.158.1
| Kpatch package | kpatch-patch-4_18_0-372_158_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:16045-05 |
| CVE(s) addressed | CVE-2025-38052 CVE-2025-38352 |
kernel-4.18.0-372.170.1
| Kpatch package | kpatch-patch-4_18_0-372_170_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHEA-2025:22349-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 8.8
kernel-4.18.0-477.81.1
| Kpatch package | kpatch-patch-4_18_0-477_81_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:16583-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-477.89.1
| Kpatch package | kpatch-patch-4_18_0-477_89_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-06-01 |
| Latest Advisory | RHSA-2025:16583-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-477.97.1
| Kpatch package | kpatch-patch-4_18_0-477_97_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-09-01 |
| Latest Advisory | RHSA-2025:16583-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-477.107.1
| Kpatch package | kpatch-patch-4_18_0-477_107_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-12-01 |
| Latest Advisory | RHSA-2025:16008-04 |
| CVE(s) addressed | CVE-2025-38052 CVE-2025-38352 |
kernel-4.18.0-477.120.1
| Kpatch package | kpatch-patch-4_18_0-477_120_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHEA-2025:22350-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 8.10
kernel-4.18.0-553.30.1
| Kpatch package | kpatch-patch-4_18_0-553_30_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:16582-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-553.40.1
| Kpatch package | kpatch-patch-4_18_0-553_40_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-06-01 |
| Latest Advisory | RHSA-2025:16582-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53141 CVE-2025-21756 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-553.53.1
| Kpatch package | kpatch-patch-4_18_0-553_53_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-09-01 |
| Latest Advisory | RHSA-2025:16582-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-553.72.1
| Kpatch package | kpatch-patch-4_18_0-553_72_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-12-01 |
| Latest Advisory | RHSA-2025:16582-05 |
| CVE(s) addressed | CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-4.18.0-553.85.1
| Kpatch package | kpatch-patch-4_18_0-553_85_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHEA-2025:22351-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 9.0
kernel-5.14.0-70.121.1
| Kpatch package | kpatch-patch-5_14_0-70_121_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:16541-05 |
| CVE(s) addressed | CVE-2022-49541 CVE-2022-49846 CVE-2023-52922 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-5.14.0-70.124.1
| Kpatch package | kpatch-patch-5_14_0-70_124_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:16541-05 |
| CVE(s) addressed | CVE-2022-49541 CVE-2022-49846 CVE-2023-52922 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-5.14.0-70.132.1
| Kpatch package | kpatch-patch-5_14_0-70_132_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:16541-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-5.14.0-70.144.1
| Kpatch package | kpatch-patch-5_14_0-70_144_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHSA-2025:15933-04 |
| CVE(s) addressed | CVE-2025-38052 CVE-2025-38352 |
kernel-5.14.0-70.155.1
| Kpatch package | kpatch-patch-5_14_0-70_155_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2026-05-29 |
| Latest Advisory | RHEA-2025:22352-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 9.2
kernel-5.14.0-284.92.1
| Kpatch package | kpatch-patch-5_14_0-284_92_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:17896-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2023-53107 CVE-2023-53186 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-284.104.1
| Kpatch package | kpatch-patch-5_14_0-284_104_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-06-01 |
| Latest Advisory | RHSA-2025:17896-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2023-53107 CVE-2023-53186 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-284.117.1
| Kpatch package | kpatch-patch-5_14_0-284_117_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-09-01 |
| Latest Advisory | RHSA-2025:17896-06 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-53107 CVE-2023-53186 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-284.134.1
| Kpatch package | kpatch-patch-5_14_0-284_134_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-12-01 |
| Latest Advisory | RHSA-2025:17896-06 |
| CVE(s) addressed | CVE-2023-53186 CVE-2025-38052 CVE-2025-38352 |
kernel-5.14.0-284.148.1
| Kpatch package | kpatch-patch-5_14_0-284_148_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHEA-2025:22353-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 9.4
kernel-5.14.0-427.44.1
| Kpatch package | kpatch-patch-5_14_0-427_44_1 |
|---|---|
| Kpatch GA Date | 2024-12-01 |
| Kpatch EOL Date | 2026-03-01 |
| Latest Advisory | RHSA-2025:16540-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53104 CVE-2024-53122 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38089 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-427.55.1
| Kpatch package | kpatch-patch-5_14_0-427_55_1 |
|---|---|
| Kpatch GA Date | 2025-03-01 |
| Kpatch EOL Date | 2026-06-01 |
| Latest Advisory | RHSA-2025:16540-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2023-52922 CVE-2024-53141 CVE-2025-21756 CVE-2025-21927 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38089 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-427.68.2
| Kpatch package | kpatch-patch-5_14_0-427_68_2 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-09-01 |
| Latest Advisory | RHSA-2025:16540-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38089 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-427.84.1
| Kpatch package | kpatch-patch-5_14_0-427_84_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-12-01 |
| Latest Advisory | RHSA-2025:16540-05 |
| CVE(s) addressed | CVE-2025-37890 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 |
kernel-5.14.0-427.100.1
| Kpatch package | kpatch-patch-5_14_0-427_100_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHEA-2025:22354-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 9.6
kernel-5.14.0-570.17.1
| Kpatch package | kpatch-patch-5_14_0-570_17_1 |
|---|---|
| Kpatch GA Date | 2025-06-01 |
| Kpatch EOL Date | 2026-09-01 |
| Latest Advisory | RHSA-2025:16538-05 |
| CVE(s) addressed | CVE-2022-49846 CVE-2025-37750 CVE-2025-37799 CVE-2025-37890 CVE-2025-37943 CVE-2025-38000 CVE-2025-38001 CVE-2025-38052 CVE-2025-38089 CVE-2025-38350 CVE-2025-38352 CVE-2025-38380 CVE-2025-38471 |
kernel-5.14.0-570.39.1
| Kpatch package | kpatch-patch-5_14_0-570_39_1 |
|---|---|
| Kpatch GA Date | 2025-09-01 |
| Kpatch EOL Date | 2026-12-01 |
| Latest Advisory | RHSA-2025:15798-04 |
| CVE(s) addressed | CVE-2025-38052 CVE-2025-38352 |
kernel-5.14.0-570.66.1
| Kpatch package | kpatch-patch-5_14_0-570_66_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHEA-2025:22355-02 |
| CVE(s) addressed | (initial package) |
Red Hat Enterprise Linux 9.7
kernel-5.14.0-611.9.1
| Kpatch package | kpatch-patch-5_14_0-611_9_1 |
|---|---|
| Kpatch GA Date | 2025-12-01 |
| Kpatch EOL Date | 2027-03-01 |
| Latest Advisory | RHSA-2025:23730-02 |
| CVE(s) addressed | CVE-2025-38499 |
Product(s)
Tags
Article Type