- Issued:
- 2024-01-23
- Updated:
- 2024-01-23
RHEA-2024:0338 - Product Enhancement Advisory
Synopsis
new package: kpatch-patch-5_14_0-362_18_1
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new kpatch-patch-5_14_0-362_18_1 package is now available for Red Hat Enterprise Linux 9.
Description
The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes.
This enhancement update adds the kpatch-patch-5_14_0-362_18_1 package to Red Hat Enterprise Linux 9. This is an empty kpatch-patch package, which does not contain any real patches. It is only a method to subscribe to the kpatch stream for kernel-5.14.0-362.18.1.el9_3. Future updates to this package will contain kernel live patches. (RHEL-21067)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
- Red Hat Enterprise Linux Server - AUS 9.4 x86_64
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
x86_64 | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.x86_64.rpm | SHA-256: 1733e6132b5702e9a662c36a5709087707dbb6b277cab74d2e66699e67ce8b50 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
x86_64 | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.x86_64.rpm | SHA-256: 1733e6132b5702e9a662c36a5709087707dbb6b277cab74d2e66699e67ce8b50 |
Red Hat Enterprise Linux Server - AUS 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
x86_64 | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.x86_64.rpm | SHA-256: 1733e6132b5702e9a662c36a5709087707dbb6b277cab74d2e66699e67ce8b50 |
Red Hat Enterprise Linux for Power, little endian 9
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
ppc64le | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.ppc64le.rpm | SHA-256: cf389995a11bd4e9562dc72c7178a428106298625d1f2892b6d49bbd832c49f2 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
ppc64le | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.ppc64le.rpm | SHA-256: cf389995a11bd4e9562dc72c7178a428106298625d1f2892b6d49bbd832c49f2 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
ppc64le | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.ppc64le.rpm | SHA-256: cf389995a11bd4e9562dc72c7178a428106298625d1f2892b6d49bbd832c49f2 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
SRPM | |
---|---|
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.src.rpm | SHA-256: 825fce92601cf258d90fb58199e1c67314b023c2f2630bf58c3cdd9c2db9ba54 |
x86_64 | |
kpatch-patch-5_14_0-362_18_1-0-0.el9_3.x86_64.rpm | SHA-256: 1733e6132b5702e9a662c36a5709087707dbb6b277cab74d2e66699e67ce8b50 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.