- Issued:
- 2023-12-12
- Updated:
- 2023-12-12
RHEA-2023:7735 - Product Enhancement Advisory
Synopsis
new package: kpatch-patch-5_14_0-362_13_1
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new kpatch-patch-5_14_0-362_13_1 package is now available for Red Hat Enterprise Linux 9.
Description
The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes.
This enhancement update adds the kpatch-patch-5_14_0-362_13_1 package to Red Hat Enterprise Linux 9. This is an empty kpatch-patch package, which does not contain any real patches. It is only a method to subscribe to the kpatch stream for kernel-5.14.0-362.13.1.el9_3. Future updates to this package will contain kernel live patches. (RHEL-17431)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
x86_64 | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.x86_64.rpm | SHA-256: b9bd681f44e90f5dbb8bcb456c49b0d2cfd38095fbad8a4be0b3d6a29bca08ad |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
x86_64 | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.x86_64.rpm | SHA-256: b9bd681f44e90f5dbb8bcb456c49b0d2cfd38095fbad8a4be0b3d6a29bca08ad |
Red Hat Enterprise Linux Server - AUS 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
x86_64 | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.x86_64.rpm | SHA-256: b9bd681f44e90f5dbb8bcb456c49b0d2cfd38095fbad8a4be0b3d6a29bca08ad |
Red Hat Enterprise Linux for Power, little endian 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
ppc64le | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.ppc64le.rpm | SHA-256: 79ee86ce8275a86a820cdf6e49ce6ada1559c38f5dfa2631a518f43e7d34459c |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
ppc64le | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.ppc64le.rpm | SHA-256: 79ee86ce8275a86a820cdf6e49ce6ada1559c38f5dfa2631a518f43e7d34459c |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
ppc64le | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.ppc64le.rpm | SHA-256: 79ee86ce8275a86a820cdf6e49ce6ada1559c38f5dfa2631a518f43e7d34459c |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.src.rpm | SHA-256: 1ccbc8cb7bdabe59e1d0173568df51b567e432d5e6600ce7f00711de6a392dcf |
x86_64 | |
kpatch-patch-5_14_0-362_13_1-0-0.el9_3.x86_64.rpm | SHA-256: b9bd681f44e90f5dbb8bcb456c49b0d2cfd38095fbad8a4be0b3d6a29bca08ad |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.