- Issued:
- 2021-07-20
- Updated:
- 2021-07-20
RHSA-2021:2716 - Security Advisory
Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)
- kernel: race condition for removal of the HCI controller (CVE-2021-32399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer
- BZ - 1970807 - CVE-2021-32399 kernel: race condition for removal of the HCI controller
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux Server - AUS 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux Server - AUS 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for Power, little endian 8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux Server - TUS 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux Server - TUS 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux Server - TUS 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
ppc64le | |
kpatch-patch-4_18_0-305-1-3.el8.ppc64le.rpm | SHA-256: 92646a9da08de8afd514f5d6a9aaa3df0e81e386cebf27b976c7155e58a3786b |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.ppc64le.rpm | SHA-256: afe4aeb2f1eb9a71964d30f3b149058d35fb8e49045a18618579fa69a390d822 |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.ppc64le.rpm | SHA-256: 106f8d03d39289bd1db5aa56bb3161f87dee8efbdac2c4c1824e4b837ac63bfe |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.ppc64le.rpm | SHA-256: adeadf3d49f21e896d791c0b5dbb29947c8bbee2b5d68cc3528e214ba8899934 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a6d3b80f5099b5b847c4183f4ce16de509001990572321b4f4204835bbc2724a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 9545fa205d44f52621a5b3ff7c74c4de598e8ddf6d70e431f42b12bac8ea9a8f |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.ppc64le.rpm | SHA-256: 6375619ee081beed2b91782d740b7e89755c6403bea07ac892a701ef64e2a4c2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: 765d5ea05f7a30ac05bbed03b6d8a2c9a2ed45990c383e2ad970ad93922aac16 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: d2b8464c8abca9fcf2b0335eb2591f3c0a10c3211e021358b7c2c19c9349b553 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-3.el8.src.rpm | SHA-256: 29532eed0a9678cc6d8481b2b327971c8ca9e485f8a1c1f971658565dec6f187 |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.src.rpm | SHA-256: efc7eeb0f52b3e26b2549c609c2c36f2e2da98af6e000c46e961b419f83f0a87 |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.src.rpm | SHA-256: 1f7ea6ec7420ff9b46b9f440141d5ec38ecb9178e09a4290e52101e7b00a1dd5 |
x86_64 | |
kpatch-patch-4_18_0-305-1-3.el8.x86_64.rpm | SHA-256: 57e813df682799a3396a51f8abb5883a0b733c38fe020ad5e24690df304ce391 |
kpatch-patch-4_18_0-305-debuginfo-1-3.el8.x86_64.rpm | SHA-256: 3a95e4bd950da6c7297f0e5d836067f5c8f1020274ad3d9631ede944bf0a573d |
kpatch-patch-4_18_0-305-debugsource-1-3.el8.x86_64.rpm | SHA-256: 30c67485116ae49e1e0fbc5910e3e220f31887fdf594a7e52f5702af0c69677b |
kpatch-patch-4_18_0-305_3_1-1-2.el8_4.x86_64.rpm | SHA-256: f3e0f1ff54ff44d9adfe21851793af59d50050e943081d6cd114251d9145d7c1 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-2.el8_4.x86_64.rpm | SHA-256: 693dbfe6ef25e29166b65e8ff02bbf8b0e603d581d295561028768b4a18a9974 |
kpatch-patch-4_18_0-305_3_1-debugsource-1-2.el8_4.x86_64.rpm | SHA-256: 6b80d687b188fe5b3b5555b799cb72eacb3e43643d45ffd95cb7fcee34ac825d |
kpatch-patch-4_18_0-305_7_1-1-1.el8_4.x86_64.rpm | SHA-256: 269fcea0bec1b4b6daa20fcc30725fc1d79dc4718579a78d3db8c098794c46d2 |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-1.el8_4.x86_64.rpm | SHA-256: a03adabfb66b72cfaa595ffd9e8356e42ef2d1152d21ffbdbd1c242c4e8c60a9 |
kpatch-patch-4_18_0-305_7_1-debugsource-1-1.el8_4.x86_64.rpm | SHA-256: 6c8d7838eaca533b67b0d9a61564f16bf2e0dd9fb4c3f9f336635bae50269742 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.