- Issued:
- 2023-11-07
- Updated:
- 2023-11-07
RHEA-2023:6747 - Product Enhancement Advisory
Synopsis
new package: kpatch-patch-5_14_0-362_8_1
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new kpatch-patch-5_14_0-362_8_1 package is now available for Red Hat Enterprise Linux 9.
Description
The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes.
This enhancement update adds the kpatch-patch-5_14_0-362_8_1 package to Red Hat Enterprise Linux 9. This is an empty kpatch-patch package, which does not contain any real patches. It is only a method to subscribe to the kpatch stream for kernel-5.14.0-362.8.1.el9_3. Future updates to this package will contain kernel live patches. (RHEL-14595)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
x86_64 | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.x86_64.rpm | SHA-256: 6e194bc04d4767a12e5dd61fd719a5c1f293bf28b4fe8ceb2f40736acc1225e6 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
x86_64 | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.x86_64.rpm | SHA-256: 6e194bc04d4767a12e5dd61fd719a5c1f293bf28b4fe8ceb2f40736acc1225e6 |
Red Hat Enterprise Linux Server - AUS 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
x86_64 | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.x86_64.rpm | SHA-256: 6e194bc04d4767a12e5dd61fd719a5c1f293bf28b4fe8ceb2f40736acc1225e6 |
Red Hat Enterprise Linux for Power, little endian 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
ppc64le | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.ppc64le.rpm | SHA-256: 3b5b1a4740385bcfe2e74930494ca4f32b17fd0f95a61f5cdad5fc86614a716b |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
ppc64le | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.ppc64le.rpm | SHA-256: 3b5b1a4740385bcfe2e74930494ca4f32b17fd0f95a61f5cdad5fc86614a716b |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
ppc64le | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.ppc64le.rpm | SHA-256: 3b5b1a4740385bcfe2e74930494ca4f32b17fd0f95a61f5cdad5fc86614a716b |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.src.rpm | SHA-256: 02ddbd6ae7d5bb5fda26d09c6ec6d70bd37a90ed908fd3c186155743c0a4e0b4 |
x86_64 | |
kpatch-patch-5_14_0-362_8_1-0-0.el9_3.x86_64.rpm | SHA-256: 6e194bc04d4767a12e5dd61fd719a5c1f293bf28b4fe8ceb2f40736acc1225e6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.