Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2020:2519 - Security Advisory
Issued:
2020-06-10
Updated:
2020-06-10

RHSA-2020:2519 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)
  • kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64
  • Red Hat Enterprise Linux Server - AUS 7.7 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le
  • Red Hat Enterprise Linux Server - TUS 7.7 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7 x86_64

Fixes

  • BZ - 1786164 - CVE-2019-19768 kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c
  • BZ - 1825116 - CVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic

CVEs

  • CVE-2019-19768
  • CVE-2020-10711

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
x86_64
kpatch-patch-3_10_0-1062-1-18.el7.x86_64.rpm SHA-256: e2d72b2c8551a1d82ba45ca270c06e984aa0a035cec9a96c1cb6edcb176313b8
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.x86_64.rpm SHA-256: 59938befe1d4c0809d967d5871522bb0f4255eac1672ee15c7f2bcf18f696560
kpatch-patch-3_10_0-1062_12_1-1-2.el7.x86_64.rpm SHA-256: 1f8d1331fe498cfa6b6394c388912a2582e71ec537b5a4075561a81b227461d5
kpatch-patch-3_10_0-1062_18_1-1-2.el7.x86_64.rpm SHA-256: 50c900ab64012abc650be9a1389f35eae22cbc7290cccd140a0d3de2bc251a71
kpatch-patch-3_10_0-1062_1_1-1-17.el7.x86_64.rpm SHA-256: 4011042eadb2c2f4154131f4cd9268e712458dd502c2fafd9215594570ab684c
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.x86_64.rpm SHA-256: b1adec6abea472e5b30d9d0efacdc71d598e3e0d077a053862c35a206fc51ff7
kpatch-patch-3_10_0-1062_1_2-1-16.el7.x86_64.rpm SHA-256: cc39f2920bf620e3caba4d7212c2b79e5cbb6134eb2888c9ebe949e3cdfc2b46
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.x86_64.rpm SHA-256: bd6a8f59545fb543496791bafe36b58f7826d42ebfb6578f05ea429fad1945a4
kpatch-patch-3_10_0-1062_21_1-1-2.el7.x86_64.rpm SHA-256: 2fbe849d1507e8aa714b53d12c86958ca0b4e5c7ec9de61f0c1e39ace318577a
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 6a5119bea7baf96786b9b8216ba539be56f08514a06e2fe8df1f54c9d80a1161
kpatch-patch-3_10_0-1062_4_1-1-13.el7.x86_64.rpm SHA-256: 3f8110810a1cab61b09a166681a81c0816143e206b6eca31f8b992863d25d1af
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.x86_64.rpm SHA-256: 4f5f90252f4429f6a003ae4934b48c3e55e33b9e611c383c1b1f5a735da9f21b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.x86_64.rpm SHA-256: 14866a17e219559ded62eb6604278a7d9e9a8ee2d6211021a6ca4faa99f67d64
kpatch-patch-3_10_0-1062_4_3-1-10.el7.x86_64.rpm SHA-256: a24328ae1b2e8e77727cfa63e51ca52093ab6a6416cf682587f9aaaa808b6dd6
kpatch-patch-3_10_0-1062_7_1-1-7.el7.x86_64.rpm SHA-256: ec990efaba3387f3b51cea830cc46deb595f2639de4361ec79f8c782a40493ac
kpatch-patch-3_10_0-1062_9_1-1-7.el7.x86_64.rpm SHA-256: 433c811ed0f42390b7874bdf4aee455166af55033c4f6990eea51ad6e8023613

Red Hat Enterprise Linux Server - AUS 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
x86_64
kpatch-patch-3_10_0-1062-1-18.el7.x86_64.rpm SHA-256: e2d72b2c8551a1d82ba45ca270c06e984aa0a035cec9a96c1cb6edcb176313b8
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.x86_64.rpm SHA-256: 59938befe1d4c0809d967d5871522bb0f4255eac1672ee15c7f2bcf18f696560
kpatch-patch-3_10_0-1062_12_1-1-2.el7.x86_64.rpm SHA-256: 1f8d1331fe498cfa6b6394c388912a2582e71ec537b5a4075561a81b227461d5
kpatch-patch-3_10_0-1062_18_1-1-2.el7.x86_64.rpm SHA-256: 50c900ab64012abc650be9a1389f35eae22cbc7290cccd140a0d3de2bc251a71
kpatch-patch-3_10_0-1062_1_1-1-17.el7.x86_64.rpm SHA-256: 4011042eadb2c2f4154131f4cd9268e712458dd502c2fafd9215594570ab684c
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.x86_64.rpm SHA-256: b1adec6abea472e5b30d9d0efacdc71d598e3e0d077a053862c35a206fc51ff7
kpatch-patch-3_10_0-1062_1_2-1-16.el7.x86_64.rpm SHA-256: cc39f2920bf620e3caba4d7212c2b79e5cbb6134eb2888c9ebe949e3cdfc2b46
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.x86_64.rpm SHA-256: bd6a8f59545fb543496791bafe36b58f7826d42ebfb6578f05ea429fad1945a4
kpatch-patch-3_10_0-1062_21_1-1-2.el7.x86_64.rpm SHA-256: 2fbe849d1507e8aa714b53d12c86958ca0b4e5c7ec9de61f0c1e39ace318577a
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 6a5119bea7baf96786b9b8216ba539be56f08514a06e2fe8df1f54c9d80a1161
kpatch-patch-3_10_0-1062_4_1-1-13.el7.x86_64.rpm SHA-256: 3f8110810a1cab61b09a166681a81c0816143e206b6eca31f8b992863d25d1af
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.x86_64.rpm SHA-256: 4f5f90252f4429f6a003ae4934b48c3e55e33b9e611c383c1b1f5a735da9f21b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.x86_64.rpm SHA-256: 14866a17e219559ded62eb6604278a7d9e9a8ee2d6211021a6ca4faa99f67d64
kpatch-patch-3_10_0-1062_4_3-1-10.el7.x86_64.rpm SHA-256: a24328ae1b2e8e77727cfa63e51ca52093ab6a6416cf682587f9aaaa808b6dd6
kpatch-patch-3_10_0-1062_7_1-1-7.el7.x86_64.rpm SHA-256: ec990efaba3387f3b51cea830cc46deb595f2639de4361ec79f8c782a40493ac
kpatch-patch-3_10_0-1062_9_1-1-7.el7.x86_64.rpm SHA-256: 433c811ed0f42390b7874bdf4aee455166af55033c4f6990eea51ad6e8023613

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
ppc64le
kpatch-patch-3_10_0-1062-1-18.el7.ppc64le.rpm SHA-256: fdc09f9e440ec219b1d3bfd7476ba7b7e87270abcb248a728e2d8f0de67bac73
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.ppc64le.rpm SHA-256: 5585bc632adfa57956d10fd23adf814fa6c80d007c2b9b3dfe172f51fd5accb0
kpatch-patch-3_10_0-1062_12_1-1-2.el7.ppc64le.rpm SHA-256: d3968127abbe41b47290292818576c347afc270b9cca869563486c5fbff12d62
kpatch-patch-3_10_0-1062_18_1-1-2.el7.ppc64le.rpm SHA-256: fc0436cd6a1a9810ffdf1b7ceaf6ec9de42844e8b4be2eda2cf50a727c972b2f
kpatch-patch-3_10_0-1062_1_1-1-17.el7.ppc64le.rpm SHA-256: eff3e3dabd3eef4c539f4d48a2824fa026f04548fab0af3f4df4312a528e46fc
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.ppc64le.rpm SHA-256: 4d0a945cbb969560c63aae4130267f3f30f0eba0bb9dff3f0a3b836ee159cb19
kpatch-patch-3_10_0-1062_1_2-1-16.el7.ppc64le.rpm SHA-256: 334da9a05ff82622ca41ccb231951ba7a5a202afd65296e5b674bae5d138cb2e
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.ppc64le.rpm SHA-256: 626b777c85c202c0354c77cd6f0aff8fe1fbc923a3501097ca464a08998ee0bb
kpatch-patch-3_10_0-1062_21_1-1-2.el7.ppc64le.rpm SHA-256: a1c0b897c171c92e4b6b90e05d6c7851b0a2f061c8b9e8ccfd1d1dc21002d5ae
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: a7982dd16d2454ea847319351ddfd1c1a87e31219491eb36596919edf195bea8
kpatch-patch-3_10_0-1062_4_1-1-13.el7.ppc64le.rpm SHA-256: 0c075b128d328dd209c53b250fa86636d2c2e16818e0108e5e2892a54f9f136b
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.ppc64le.rpm SHA-256: 66ed312bba6d4821dcde95367fe17be6003fc9584738b53da18bdf660e093d41
kpatch-patch-3_10_0-1062_4_2-1-10.el7.ppc64le.rpm SHA-256: f7c0816527300d9535221f39d285db60dbf2fe981b222efd3a29cf37ef407d43
kpatch-patch-3_10_0-1062_4_3-1-10.el7.ppc64le.rpm SHA-256: 7e466ac620add864a19c87c75d831553be25a47d54aabf63783053b15b955bed
kpatch-patch-3_10_0-1062_7_1-1-7.el7.ppc64le.rpm SHA-256: 3767c90a9cbbe05ca4991febdae310902724a2ecc42451857b181c24e0ddc05a
kpatch-patch-3_10_0-1062_9_1-1-7.el7.ppc64le.rpm SHA-256: 3e478dbfbd4cca2b56e79163e7e158d377aebeb5e9070155d793606abb7577fc

Red Hat Enterprise Linux Server - TUS 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
x86_64
kpatch-patch-3_10_0-1062-1-18.el7.x86_64.rpm SHA-256: e2d72b2c8551a1d82ba45ca270c06e984aa0a035cec9a96c1cb6edcb176313b8
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.x86_64.rpm SHA-256: 59938befe1d4c0809d967d5871522bb0f4255eac1672ee15c7f2bcf18f696560
kpatch-patch-3_10_0-1062_12_1-1-2.el7.x86_64.rpm SHA-256: 1f8d1331fe498cfa6b6394c388912a2582e71ec537b5a4075561a81b227461d5
kpatch-patch-3_10_0-1062_18_1-1-2.el7.x86_64.rpm SHA-256: 50c900ab64012abc650be9a1389f35eae22cbc7290cccd140a0d3de2bc251a71
kpatch-patch-3_10_0-1062_1_1-1-17.el7.x86_64.rpm SHA-256: 4011042eadb2c2f4154131f4cd9268e712458dd502c2fafd9215594570ab684c
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.x86_64.rpm SHA-256: b1adec6abea472e5b30d9d0efacdc71d598e3e0d077a053862c35a206fc51ff7
kpatch-patch-3_10_0-1062_1_2-1-16.el7.x86_64.rpm SHA-256: cc39f2920bf620e3caba4d7212c2b79e5cbb6134eb2888c9ebe949e3cdfc2b46
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.x86_64.rpm SHA-256: bd6a8f59545fb543496791bafe36b58f7826d42ebfb6578f05ea429fad1945a4
kpatch-patch-3_10_0-1062_21_1-1-2.el7.x86_64.rpm SHA-256: 2fbe849d1507e8aa714b53d12c86958ca0b4e5c7ec9de61f0c1e39ace318577a
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 6a5119bea7baf96786b9b8216ba539be56f08514a06e2fe8df1f54c9d80a1161
kpatch-patch-3_10_0-1062_4_1-1-13.el7.x86_64.rpm SHA-256: 3f8110810a1cab61b09a166681a81c0816143e206b6eca31f8b992863d25d1af
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.x86_64.rpm SHA-256: 4f5f90252f4429f6a003ae4934b48c3e55e33b9e611c383c1b1f5a735da9f21b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.x86_64.rpm SHA-256: 14866a17e219559ded62eb6604278a7d9e9a8ee2d6211021a6ca4faa99f67d64
kpatch-patch-3_10_0-1062_4_3-1-10.el7.x86_64.rpm SHA-256: a24328ae1b2e8e77727cfa63e51ca52093ab6a6416cf682587f9aaaa808b6dd6
kpatch-patch-3_10_0-1062_7_1-1-7.el7.x86_64.rpm SHA-256: ec990efaba3387f3b51cea830cc46deb595f2639de4361ec79f8c782a40493ac
kpatch-patch-3_10_0-1062_9_1-1-7.el7.x86_64.rpm SHA-256: 433c811ed0f42390b7874bdf4aee455166af55033c4f6990eea51ad6e8023613

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
ppc64le
kpatch-patch-3_10_0-1062-1-18.el7.ppc64le.rpm SHA-256: fdc09f9e440ec219b1d3bfd7476ba7b7e87270abcb248a728e2d8f0de67bac73
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.ppc64le.rpm SHA-256: 5585bc632adfa57956d10fd23adf814fa6c80d007c2b9b3dfe172f51fd5accb0
kpatch-patch-3_10_0-1062_12_1-1-2.el7.ppc64le.rpm SHA-256: d3968127abbe41b47290292818576c347afc270b9cca869563486c5fbff12d62
kpatch-patch-3_10_0-1062_18_1-1-2.el7.ppc64le.rpm SHA-256: fc0436cd6a1a9810ffdf1b7ceaf6ec9de42844e8b4be2eda2cf50a727c972b2f
kpatch-patch-3_10_0-1062_1_1-1-17.el7.ppc64le.rpm SHA-256: eff3e3dabd3eef4c539f4d48a2824fa026f04548fab0af3f4df4312a528e46fc
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.ppc64le.rpm SHA-256: 4d0a945cbb969560c63aae4130267f3f30f0eba0bb9dff3f0a3b836ee159cb19
kpatch-patch-3_10_0-1062_1_2-1-16.el7.ppc64le.rpm SHA-256: 334da9a05ff82622ca41ccb231951ba7a5a202afd65296e5b674bae5d138cb2e
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.ppc64le.rpm SHA-256: 626b777c85c202c0354c77cd6f0aff8fe1fbc923a3501097ca464a08998ee0bb
kpatch-patch-3_10_0-1062_21_1-1-2.el7.ppc64le.rpm SHA-256: a1c0b897c171c92e4b6b90e05d6c7851b0a2f061c8b9e8ccfd1d1dc21002d5ae
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.ppc64le.rpm SHA-256: a7982dd16d2454ea847319351ddfd1c1a87e31219491eb36596919edf195bea8
kpatch-patch-3_10_0-1062_4_1-1-13.el7.ppc64le.rpm SHA-256: 0c075b128d328dd209c53b250fa86636d2c2e16818e0108e5e2892a54f9f136b
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.ppc64le.rpm SHA-256: 66ed312bba6d4821dcde95367fe17be6003fc9584738b53da18bdf660e093d41
kpatch-patch-3_10_0-1062_4_2-1-10.el7.ppc64le.rpm SHA-256: f7c0816527300d9535221f39d285db60dbf2fe981b222efd3a29cf37ef407d43
kpatch-patch-3_10_0-1062_4_3-1-10.el7.ppc64le.rpm SHA-256: 7e466ac620add864a19c87c75d831553be25a47d54aabf63783053b15b955bed
kpatch-patch-3_10_0-1062_7_1-1-7.el7.ppc64le.rpm SHA-256: 3767c90a9cbbe05ca4991febdae310902724a2ecc42451857b181c24e0ddc05a
kpatch-patch-3_10_0-1062_9_1-1-7.el7.ppc64le.rpm SHA-256: 3e478dbfbd4cca2b56e79163e7e158d377aebeb5e9070155d793606abb7577fc

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.7

SRPM
kpatch-patch-3_10_0-1062-1-18.el7.src.rpm SHA-256: 1b8907b634d0af5df370ad7ea908297f01393d0728f52b906916f60fbb5a3c42
kpatch-patch-3_10_0-1062_12_1-1-2.el7.src.rpm SHA-256: deaf316e14e5a1db800017591a66ca6f4637956427614f1962d6f0ebe96e7eb9
kpatch-patch-3_10_0-1062_18_1-1-2.el7.src.rpm SHA-256: 64f973c0ce1e87278641a475bfa8a064e96ef43f23409f4c7718d1b213e362f4
kpatch-patch-3_10_0-1062_1_1-1-17.el7.src.rpm SHA-256: 4230b67927630e0b4b7348894722d48868dd5b919942508849bd5795bd80ef28
kpatch-patch-3_10_0-1062_1_2-1-16.el7.src.rpm SHA-256: 4a82bbf2b23fb3ab0119492e1670eba84dc5ae6328cad71d7cbbb3fe6a7bb972
kpatch-patch-3_10_0-1062_21_1-1-2.el7.src.rpm SHA-256: b0aa1d6a4fa35fa24c7f9432c7fe8ec9a4f8ad88401e7c558c58e0b7502a6e21
kpatch-patch-3_10_0-1062_4_1-1-13.el7.src.rpm SHA-256: 10726771059095f617a5ba79e11b3836ef4e73483dadba16baffd0397eb9399b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.src.rpm SHA-256: 7d0bd7e6b78aaa9fa87fbb05f1173f940c89f196d319fbbd0bd5b264692fce82
kpatch-patch-3_10_0-1062_4_3-1-10.el7.src.rpm SHA-256: e69a0cf7ec0da59ca346de2ce682636cd5e7e6324162022b35c22847f162aeeb
kpatch-patch-3_10_0-1062_7_1-1-7.el7.src.rpm SHA-256: a7c33b570d8caa8160c91b22374ca4394985041ae1d983d36b0c4332ce0162b4
kpatch-patch-3_10_0-1062_9_1-1-7.el7.src.rpm SHA-256: 356842d06a6113fe52ed33655fa1dd556777801ef60b87a254e90d8f4725fc3d
x86_64
kpatch-patch-3_10_0-1062-1-18.el7.x86_64.rpm SHA-256: e2d72b2c8551a1d82ba45ca270c06e984aa0a035cec9a96c1cb6edcb176313b8
kpatch-patch-3_10_0-1062-debuginfo-1-18.el7.x86_64.rpm SHA-256: 59938befe1d4c0809d967d5871522bb0f4255eac1672ee15c7f2bcf18f696560
kpatch-patch-3_10_0-1062_12_1-1-2.el7.x86_64.rpm SHA-256: 1f8d1331fe498cfa6b6394c388912a2582e71ec537b5a4075561a81b227461d5
kpatch-patch-3_10_0-1062_18_1-1-2.el7.x86_64.rpm SHA-256: 50c900ab64012abc650be9a1389f35eae22cbc7290cccd140a0d3de2bc251a71
kpatch-patch-3_10_0-1062_1_1-1-17.el7.x86_64.rpm SHA-256: 4011042eadb2c2f4154131f4cd9268e712458dd502c2fafd9215594570ab684c
kpatch-patch-3_10_0-1062_1_1-debuginfo-1-17.el7.x86_64.rpm SHA-256: b1adec6abea472e5b30d9d0efacdc71d598e3e0d077a053862c35a206fc51ff7
kpatch-patch-3_10_0-1062_1_2-1-16.el7.x86_64.rpm SHA-256: cc39f2920bf620e3caba4d7212c2b79e5cbb6134eb2888c9ebe949e3cdfc2b46
kpatch-patch-3_10_0-1062_1_2-debuginfo-1-16.el7.x86_64.rpm SHA-256: bd6a8f59545fb543496791bafe36b58f7826d42ebfb6578f05ea429fad1945a4
kpatch-patch-3_10_0-1062_21_1-1-2.el7.x86_64.rpm SHA-256: 2fbe849d1507e8aa714b53d12c86958ca0b4e5c7ec9de61f0c1e39ace318577a
kpatch-patch-3_10_0-1062_21_1-debuginfo-1-2.el7.x86_64.rpm SHA-256: 6a5119bea7baf96786b9b8216ba539be56f08514a06e2fe8df1f54c9d80a1161
kpatch-patch-3_10_0-1062_4_1-1-13.el7.x86_64.rpm SHA-256: 3f8110810a1cab61b09a166681a81c0816143e206b6eca31f8b992863d25d1af
kpatch-patch-3_10_0-1062_4_1-debuginfo-1-13.el7.x86_64.rpm SHA-256: 4f5f90252f4429f6a003ae4934b48c3e55e33b9e611c383c1b1f5a735da9f21b
kpatch-patch-3_10_0-1062_4_2-1-10.el7.x86_64.rpm SHA-256: 14866a17e219559ded62eb6604278a7d9e9a8ee2d6211021a6ca4faa99f67d64
kpatch-patch-3_10_0-1062_4_3-1-10.el7.x86_64.rpm SHA-256: a24328ae1b2e8e77727cfa63e51ca52093ab6a6416cf682587f9aaaa808b6dd6
kpatch-patch-3_10_0-1062_7_1-1-7.el7.x86_64.rpm SHA-256: ec990efaba3387f3b51cea830cc46deb595f2639de4361ec79f8c782a40493ac
kpatch-patch-3_10_0-1062_9_1-1-7.el7.x86_64.rpm SHA-256: 433c811ed0f42390b7874bdf4aee455166af55033c4f6990eea51ad6e8023613

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility