Here is the text rewritten in a sarcastic way, with various hastags at the beginning of the content related to content:
In a world where AI is rapidly infiltrating every aspect of our lives, it’s no surprise that the latest news is all about kernel live patching for Red Hat OpenStack Services on OpenShift. This golden era of patch management is set to take on a whole new meaning with the release of Red Hat OpenStack Services’ latest feature: kernel live patching.
First, let’s take a moment to appreciate the irony of the situation. With the number of CVEs published increasing by 38% annually, it’s clear that these vulnerabilities, which can compromise the security of critical systems, are becoming increasingly sophisticated and dangerous. But that’s not the only irony – kernel live patching seems to be the silver bullet that can save the day, even in the face of these existential threats.
Now, let’s delve deeper into the insidious world of kernel live patching. This technology allows you to apply essential security patches to a running Linux kernel without the need for a complete reboot or interrupting the runtime.
In this article, you will learn about kernel live patching for Red Hat OpenStack Services on OpenShift environments. The year 2024 marked a significant milestone, with over 40,000 Common Vulnerabilities and Exposures (CVEs) published, representing a 38% increase from the 28,818 CVEs in 2023. According to a lwn.net report, this continues a consecutive seven-year trend of record-high CVE publications since 2017. Experts predict another record-breaking year of CVE production in 2025, with estimates ranging from 48,675 to 58,956 new CVEs, which will likely bring the total number of CVEs above 300,000.
Given the escalating speed and sophistication of AI-powered attacks, as well as the continuous surge in CVEs, kernel live patching has become an indispensable practice, especially for critical systems and servers.
What is Linux kernel live patching?
Linux kernel live patching is a method for applying critical security patches to a running Linux kernel without the need to reboot or interrupt runtime.
Without live patching, applying a patch typically requires rebooting the patched service or app to load the new changes of the patched version. This is true even for patches applied to the Linux kernel itself, creating a conundrum for Linux system administrators. They need to apply imperative security updates, but that means unscheduled reboots to the Linux server, including latency and downtime.
Learn more about kernel live patch mechanics.
OpenStack Services on OpenShift environments
Starting with feature release 2, users can test a technology preview of kernel live patching support for OpenStack Services on OpenShift compute nodes. With this feature, users can apply critical security patches to a running Linux kernel in-memory, without needing to reboot or interrupt the runtime. This means you no longer need to drain the clusters and migrate the workload when applying CVE patches that require kernel updates, resulting in fewer maintenance windows.
The process would entail the operator creating a file kpatch-deployment.yaml
OpenStackDataPlaneDeployment
custom resource (CR) as follows:
apiVersion: dataplane.openstack.org/v1beta1
kind: OpenStackDataPlaneDeployment
metadata:
name: apply-kpatch
namespace: openstack
spec:
nodeSets:
- <nodeSet_name> 1
servicesOverride:
- update 2
ansibleExtraVars: 3
edpm_update_enable_kpatch: true
ansibleLimit: <node_hostname>,...,<node_hostname> 4
- Lists the
OpenStackDataPlaneDeploymentNodeSet
CRs that contain the nodes that you are applying kernel live patching. - Specifies the update as the only service to execute.
- Enables the flag of
kpatch edpm_update_enable_kpatch: true
- Optional: Lists the individual nodes in the node set to apply the kernel live patch process. If not set, all the nodes in the node set are affected.
As shown in Figure 1, the operator would apply the kpatch-deployment.yaml
file:
oc apply -f kpatch-deployment.yaml

You can view the Ansible logs while the deployment executes as follows:
oc get pod -l app=openstackansibleee -w
oc logs update-apply-kpatch-openstack-edpm-2z6hb
Finally, check that the kernel live patching process has been applied successfully:
oc get openstackdataplanedeployment
NAME NODESETS STATUS MESSAGE
edpm-deployment-post-ceph ["openstack-edpm"] True Setup complete
edpm-deployment-pre-ceph ["openstack-edpm"] True Setup complete
apply-kpatch ["openstack-edpm"] False Deployment in progress
----
Redefine your maintenance windows
Kernel live patching offers significant operational advantages by fundamentally changing how you approach system maintenance and security updates:
- Allows you to apply critical and important security patches to a running Linux kernel, without the need to reboot or interrupt runtime.
- No need to drain the clusters and migrate the workload.
- Results in fewer maintenance windows.
Try it
Leveraging kernel live patching is a great way to keep your infrastructure updated and minimize the amount of manual work required. General Availability of kernel live patching for Red Hat OpenStack Services on OpenShift is targeted for feature release 4 and expected in November 2025.
You can learn more in the Linux Kernel’s livepatch documentation and in Red Hat Enterprise Linux Applying patches with kernel live patching documentation.
The post Staying ahead of artificial intelligence threats appeared first on Red Hat Developer.