- Issued:
- 2023-05-31
- Updated:
- 2023-05-31
RHEA-2023:3359 - Product Enhancement Advisory
Synopsis
new package: kpatch-patch-4_18_0-477_13_1
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new kpatch-patch-4_18_0-477_13_1 package is now available for Red Hat Enterprise Linux 8.
Description
The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes.
This enhancement update adds the kpatch-patch-4_18_0-477_13_1 package to Red Hat Enterprise Linux 8. This is an empty kpatch-patch package, which does not contain any real patches. It is only a method to subscribe to the kpatch stream for kernel-4.18.0-477.13.1.el8_8. Future updates to this package will contain kernel live patches. (BZ#2209331)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
x86_64 | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.x86_64.rpm | SHA-256: b1fdd3e7d33a5c06f53def999be9ff9462823402a05f4d2d3d3a23aef78ce3bd |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
x86_64 | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.x86_64.rpm | SHA-256: b1fdd3e7d33a5c06f53def999be9ff9462823402a05f4d2d3d3a23aef78ce3bd |
Red Hat Enterprise Linux for Power, little endian 8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
ppc64le | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.ppc64le.rpm | SHA-256: aa0241faddb1cbc23c18ae415223279d725425d23ec091b4b06298ed7d3f8c35 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
ppc64le | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.ppc64le.rpm | SHA-256: aa0241faddb1cbc23c18ae415223279d725425d23ec091b4b06298ed7d3f8c35 |
Red Hat Enterprise Linux Server - TUS 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
x86_64 | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.x86_64.rpm | SHA-256: b1fdd3e7d33a5c06f53def999be9ff9462823402a05f4d2d3d3a23aef78ce3bd |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
ppc64le | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.ppc64le.rpm | SHA-256: aa0241faddb1cbc23c18ae415223279d725425d23ec091b4b06298ed7d3f8c35 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.src.rpm | SHA-256: 6f48e700571b172ae93828565937646dc8b49f453635337b0127d258b9ddf2ac |
x86_64 | |
kpatch-patch-4_18_0-477_13_1-0-0.el8_8.x86_64.rpm | SHA-256: b1fdd3e7d33a5c06f53def999be9ff9462823402a05f4d2d3d3a23aef78ce3bd |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.