Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2020:0630 - Security Advisory
Issued:
2020-02-27
Updated:
2020-02-27

RHSA-2020:0630 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: ppp security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for ppp is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.

Security Fix(es):

  • ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64
  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 1800727 - CVE-2020-8597 ppp: Buffer overflow in the eap_request and eap_response functions in eap.c

CVEs

  • CVE-2020-8597

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux Workstation 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux Desktop 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux for IBM z Systems 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
s390x
ppp-2.4.5-34.el7_7.s390x.rpm SHA-256: 069665928652bdc0f1581fcc90128c865c3780b4c28bb9698c4579961064e6fc
ppp-debuginfo-2.4.5-34.el7_7.s390.rpm SHA-256: 72f682c345dc19d3b8e2544b80001d478249177ac138cd8573f17d829b0f64e0
ppp-debuginfo-2.4.5-34.el7_7.s390x.rpm SHA-256: 0fa3856516e1348d100fcc791b238279bd3cdb9c141a6140780893f1452ab1a8
ppp-debuginfo-2.4.5-34.el7_7.s390x.rpm SHA-256: 0fa3856516e1348d100fcc791b238279bd3cdb9c141a6140780893f1452ab1a8
ppp-devel-2.4.5-34.el7_7.s390.rpm SHA-256: 97ac3c403090e4ec14bb3b7779ab67a3f07ff0e1e4385afac6a811f45c9050ed
ppp-devel-2.4.5-34.el7_7.s390x.rpm SHA-256: 151ced23bbf4388a7c11c87293b8398c7c5893d1132a4334e3b7e8ec18a0bab1

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
s390x
ppp-2.4.5-34.el7_7.s390x.rpm SHA-256: 069665928652bdc0f1581fcc90128c865c3780b4c28bb9698c4579961064e6fc
ppp-debuginfo-2.4.5-34.el7_7.s390.rpm SHA-256: 72f682c345dc19d3b8e2544b80001d478249177ac138cd8573f17d829b0f64e0
ppp-debuginfo-2.4.5-34.el7_7.s390x.rpm SHA-256: 0fa3856516e1348d100fcc791b238279bd3cdb9c141a6140780893f1452ab1a8
ppp-debuginfo-2.4.5-34.el7_7.s390x.rpm SHA-256: 0fa3856516e1348d100fcc791b238279bd3cdb9c141a6140780893f1452ab1a8
ppp-devel-2.4.5-34.el7_7.s390.rpm SHA-256: 97ac3c403090e4ec14bb3b7779ab67a3f07ff0e1e4385afac6a811f45c9050ed
ppp-devel-2.4.5-34.el7_7.s390x.rpm SHA-256: 151ced23bbf4388a7c11c87293b8398c7c5893d1132a4334e3b7e8ec18a0bab1

Red Hat Enterprise Linux for Power, big endian 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
ppc64
ppp-2.4.5-34.el7_7.ppc64.rpm SHA-256: 53b4fa8bd5bb7ac66551f7f1c0adbc1437902170293e23a7fdac67b8944d53dd
ppp-debuginfo-2.4.5-34.el7_7.ppc.rpm SHA-256: 6f86739bf0dc7b19a6789ec97e4d43254bfa49a28d6e193eb286b1d576453fbd
ppp-debuginfo-2.4.5-34.el7_7.ppc64.rpm SHA-256: 80b02393b9cd515902d8cb2b1b089af9b3c740da92335cc6f7d114ae8208b628
ppp-debuginfo-2.4.5-34.el7_7.ppc64.rpm SHA-256: 80b02393b9cd515902d8cb2b1b089af9b3c740da92335cc6f7d114ae8208b628
ppp-devel-2.4.5-34.el7_7.ppc.rpm SHA-256: f463fa8d32f5d836a676cfb9c26d12cb9e4a33f0842bef0c40900c7a19852272
ppp-devel-2.4.5-34.el7_7.ppc64.rpm SHA-256: 341dac654eac3ee070267dcc7019d2a62d04bc3378eba0e99d2bc5da88dae276

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
ppc64
ppp-2.4.5-34.el7_7.ppc64.rpm SHA-256: 53b4fa8bd5bb7ac66551f7f1c0adbc1437902170293e23a7fdac67b8944d53dd
ppp-debuginfo-2.4.5-34.el7_7.ppc.rpm SHA-256: 6f86739bf0dc7b19a6789ec97e4d43254bfa49a28d6e193eb286b1d576453fbd
ppp-debuginfo-2.4.5-34.el7_7.ppc64.rpm SHA-256: 80b02393b9cd515902d8cb2b1b089af9b3c740da92335cc6f7d114ae8208b628
ppp-debuginfo-2.4.5-34.el7_7.ppc64.rpm SHA-256: 80b02393b9cd515902d8cb2b1b089af9b3c740da92335cc6f7d114ae8208b628
ppp-devel-2.4.5-34.el7_7.ppc.rpm SHA-256: f463fa8d32f5d836a676cfb9c26d12cb9e4a33f0842bef0c40900c7a19852272
ppp-devel-2.4.5-34.el7_7.ppc64.rpm SHA-256: 341dac654eac3ee070267dcc7019d2a62d04bc3378eba0e99d2bc5da88dae276

Red Hat Enterprise Linux for Scientific Computing 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux EUS Compute Node 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux for Power, little endian 7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
ppc64le
ppp-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 9056e5acb7ecfa322582a2e348ebe7e9d37c0c7adc6daeadea066873b84b783a
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-devel-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 1fcca729bc2ef1bf935188cd729113fa75805f055b74952109bb598713597254

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
ppc64le
ppp-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 9056e5acb7ecfa322582a2e348ebe7e9d37c0c7adc6daeadea066873b84b783a
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-devel-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 1fcca729bc2ef1bf935188cd729113fa75805f055b74952109bb598713597254

Red Hat Enterprise Linux Server - TUS 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
ppc64le
ppp-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 9056e5acb7ecfa322582a2e348ebe7e9d37c0c7adc6daeadea066873b84b783a
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-debuginfo-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 04cac02f09764fce9da700c6c2860df1bdad14c91fbcb1fe425766ed60ca4874
ppp-devel-2.4.5-34.el7_7.ppc64le.rpm SHA-256: 1fcca729bc2ef1bf935188cd729113fa75805f055b74952109bb598713597254

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM
ppp-2.4.5-34.el7_7.src.rpm SHA-256: c8b3b49e4c7281634e7c5c1dbef124fa96a141cf972b90af3c0039a7964ab70e
x86_64
ppp-2.4.5-34.el7_7.x86_64.rpm SHA-256: 6d0df821f6dfec2105c069973078358ea6f3765122b77dacd91bbfd9f6a749b9
ppp-debuginfo-2.4.5-34.el7_7.i686.rpm SHA-256: 31484fae3ac600ef3b7ee386479f1e55108217efc2d4c3ec31c427ae97e2de6d
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-debuginfo-2.4.5-34.el7_7.x86_64.rpm SHA-256: 554739e653ed327964a98d1e1cb9887bfc55192e2a62e96ed150829a56349b53
ppp-devel-2.4.5-34.el7_7.i686.rpm SHA-256: 01c498ad15ba74b67e702cd13df0db6ffb7bd4da1b7c040e5c1fa41e3ea0251d
ppp-devel-2.4.5-34.el7_7.x86_64.rpm SHA-256: 0e6ef3f9b82d2d1178c0c1bdea9b8a1b64a88f810e1bf9380b45220db77f3f1b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter