Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2021:2723 - Security Advisory
Issued:
2021-07-20
Updated:
2021-07-20

RHSA-2021:2723 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer

CVEs

  • CVE-2021-33909

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2021-006
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
x86_64
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.x86_64.rpm SHA-256: 688e57584dd7ad34b9ff0f1d07620963d5680f7b8111f91da1686f41a649dbf6
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 8b42ff7445d821086c5f758e705c111ff34cbf8715da88162820aaa31ba66e1e
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.x86_64.rpm SHA-256: e8cd54e3b0dd6747ae41bf1cf0542475f821f037c0b163d70b8114bf52173ebb
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.x86_64.rpm SHA-256: 862eaa60d2cb80d4868cee732ed2e31238b71d4eba2493db35c6424e52460a26
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 857f618860276aa21593b8e419637fa715fc16486c450bd611b22655d698e235
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.x86_64.rpm SHA-256: 9bf31f4cef27960f670e7c5e3d103fed8c4fa36add1a6c0bfdf11d1a4f343d44
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.x86_64.rpm SHA-256: 08119cc4e8e2dcdeefa2f9032348955872af87c360292b2c1d1eee96effb1be9
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: 8b11e7e6000552aed1b9f304beb5ca12277e99888690ead9ae50517f4f203319
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: d6624bd56c646fd254f992e63e8be9fd733151ed393fae3a7f82c092f1faec87
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.x86_64.rpm SHA-256: bfee432d54fc748d353bba1522270074b338969294685737acecbc41cfa46d62
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: db0915896f44609db90ef2906f5a24dae080f731d2fb7f8bbd36b98e8c1ad77c
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: 05c6d5b49736433392df7c1f0ffbac512ecff66035b6eb00f3687bea22373130
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.x86_64.rpm SHA-256: 0d6ac844ea19b3cea7fa0423320a4dbed56af6f410a9471c753bef653ebfa0e6
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.x86_64.rpm SHA-256: fbaab96871f61e21f2f69d41ebed8126af51cb470476b5749cd91dd7a7580744
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.x86_64.rpm SHA-256: 3c0594a6cc241e7eaf6bad359a9c63fb976f7176c43fe19b82c30c94d3a5ccbd
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.x86_64.rpm SHA-256: f1f4281bf73290c4dbf20730e7fa938b79712f1345aeaea4cd65bfec2343aacc
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.x86_64.rpm SHA-256: d473d5ec2e477ce2e8415d8b6aa86c158d8afff4ed6ffc33f1cde015203d4520
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.x86_64.rpm SHA-256: 6d85443612557e68e1115001f08310bac000dd72b87df8c95b12e22be25a307b
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.x86_64.rpm SHA-256: d82ef83339e4e689c8f6edba15efbc6c5a3cc652f08b65766cefb9e8704afaeb
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.x86_64.rpm SHA-256: 54375e03aed5106b6008d4048115f4f4b17b5b543a1fca42746c23dc55b3250b
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.x86_64.rpm SHA-256: 77f1d638997593339b67476ee234936d0da081ca1f1176e6b29d856a2b64b2de
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.x86_64.rpm SHA-256: 0af90d50e52580df477d2cdd5fe3433f0b911a53dc110d34b15096753259c0d6
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 845e20832008d4777491e50497ea4e7c84554a851c0d2251565e0fa4e02a2db7
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 46fef105c499ab60f528472059beda2aaf435cdaba9f2578e720b280c7338d3d
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.x86_64.rpm SHA-256: 5259d04dbccadba9b72ba1f8d10d80158c2e171c769cddd2b98d3921e81175f4
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: 67812f45150f65a56ce9a035fe90b382a1c7bc8b33d80eaa1c316097f3ee1cc5
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: 73560fd09eaac988fef30466eac92f9e9d0abb70f7f8789ca4e7338a1424e211

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
ppc64le
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.ppc64le.rpm SHA-256: bdbd504487c41f1d38e421dc1b63d89ec4580b1d49c30c3d13dbc5287460e442
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: cb14c1951ecacea1e2bcfea504fd26bcee43a37bf1e8b36b7ed0e1c87e19a3f6
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: 65c24a1b43ee8fcf1bdf3c332420e4e35c1040719b9504c20a9625af35a2c923
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.ppc64le.rpm SHA-256: b18e3be4b39b6ae1238bdf557b6a9d0f53d0804df759a92eff65c91af1737b01
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: 788615133a8d141d6a3ac82ec8cc2312821efa8b6477014283a03b36e3ad1113
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: fc9815e423f603739f7e9bedab4c58ae17f2f23eff7e66c2f8a4c54e4b468801
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.ppc64le.rpm SHA-256: 1be89293402553fa24c815a690e988772a094320fda34397c23e8a144a0277f5
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: 55edd8d6a35d71ee9101cc4d0412b3e99d859afe8b942270f03ab8a890a221ac
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: e892d1b6038bf4fd1baa205c8a79ab5519baa0729c3f16b1702c618dc11ac02e
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.ppc64le.rpm SHA-256: 26fa83901a75ca00225ca3bc0a2e0cba9c062875b41a0c69e949a1445423e6ba
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: cb81252a1b778b79dc5be9bd957deff5cc1c88bdf567b424d2e4f4f5ee8d5037
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: ad479f1c00ba0301c2c4e02ab9e9ed19209123bd6744d600c2728de29061ae2f
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.ppc64le.rpm SHA-256: cecddbea42179fdf72f870bfe15a9319644047ab592af3efc881838f42536940
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.ppc64le.rpm SHA-256: e38d9572e7acd4f15e07be0ca869700ef2738a858a4f2b020e20f71d724a670b
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.ppc64le.rpm SHA-256: 4c8eaa7ae7271ee99c7b956d37c120e260d4d36d8c5593b1e10d50524fdd0bec
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.ppc64le.rpm SHA-256: 94b4027d65e38a3f13e3bbedcb1f8a86fd79e7fd965f4cb5b6f32f6465448813
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.ppc64le.rpm SHA-256: daca55b6f027af719f53ab9ac09e035175d31dead33605ec40abd91754f56e6c
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.ppc64le.rpm SHA-256: 0da1bc1207dfba5f7d9c296432613ccb6b6fce48fe7a7a6981b61084932b0b02
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.ppc64le.rpm SHA-256: 142efdb4563d48f9ebd1be1a2131f8b03d557b8b24345c95a5c2db4d5bf15dfe
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.ppc64le.rpm SHA-256: 2313244bd99881f751d3241fc830959aa6b3268af436a55a0c2cfe94ff5d9c52
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.ppc64le.rpm SHA-256: 44c604f659350eb7622a7c96d03c987b38fb163e089d5465982aa56410fa5692
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.ppc64le.rpm SHA-256: ed987f031096957795a8fb9ab9cd87952e228237c4f6600982e36d725bbdf21e
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 3d0611f4a6ff0b2256a8764c31b51ae894a29ca6066266718a77cb14e9e9b1d8
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: e6bab3b30e58b844a0edb5a787f35615a13c49c52bb24999b78a9793a2fc1d53
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.ppc64le.rpm SHA-256: 0d4ec30783f58a13169cf327f097ef364219bf6a6be51078e5b029c1c8a607f8
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: fb16073830c05c25c1488cab2d20cec8e05ba9e6480435524a1f4d4c764057c4
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 837bcc6d5ab98f6805dc5b3cee69aa2af92a1187f71bf1df5595d3abd54e53b0

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
ppc64le
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.ppc64le.rpm SHA-256: bdbd504487c41f1d38e421dc1b63d89ec4580b1d49c30c3d13dbc5287460e442
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: cb14c1951ecacea1e2bcfea504fd26bcee43a37bf1e8b36b7ed0e1c87e19a3f6
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: 65c24a1b43ee8fcf1bdf3c332420e4e35c1040719b9504c20a9625af35a2c923
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.ppc64le.rpm SHA-256: b18e3be4b39b6ae1238bdf557b6a9d0f53d0804df759a92eff65c91af1737b01
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: 788615133a8d141d6a3ac82ec8cc2312821efa8b6477014283a03b36e3ad1113
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: fc9815e423f603739f7e9bedab4c58ae17f2f23eff7e66c2f8a4c54e4b468801
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.ppc64le.rpm SHA-256: 1be89293402553fa24c815a690e988772a094320fda34397c23e8a144a0277f5
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: 55edd8d6a35d71ee9101cc4d0412b3e99d859afe8b942270f03ab8a890a221ac
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: e892d1b6038bf4fd1baa205c8a79ab5519baa0729c3f16b1702c618dc11ac02e
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.ppc64le.rpm SHA-256: 26fa83901a75ca00225ca3bc0a2e0cba9c062875b41a0c69e949a1445423e6ba
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: cb81252a1b778b79dc5be9bd957deff5cc1c88bdf567b424d2e4f4f5ee8d5037
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: ad479f1c00ba0301c2c4e02ab9e9ed19209123bd6744d600c2728de29061ae2f
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.ppc64le.rpm SHA-256: cecddbea42179fdf72f870bfe15a9319644047ab592af3efc881838f42536940
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.ppc64le.rpm SHA-256: e38d9572e7acd4f15e07be0ca869700ef2738a858a4f2b020e20f71d724a670b
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.ppc64le.rpm SHA-256: 4c8eaa7ae7271ee99c7b956d37c120e260d4d36d8c5593b1e10d50524fdd0bec
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.ppc64le.rpm SHA-256: 94b4027d65e38a3f13e3bbedcb1f8a86fd79e7fd965f4cb5b6f32f6465448813
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.ppc64le.rpm SHA-256: daca55b6f027af719f53ab9ac09e035175d31dead33605ec40abd91754f56e6c
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.ppc64le.rpm SHA-256: 0da1bc1207dfba5f7d9c296432613ccb6b6fce48fe7a7a6981b61084932b0b02
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.ppc64le.rpm SHA-256: 142efdb4563d48f9ebd1be1a2131f8b03d557b8b24345c95a5c2db4d5bf15dfe
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.ppc64le.rpm SHA-256: 2313244bd99881f751d3241fc830959aa6b3268af436a55a0c2cfe94ff5d9c52
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.ppc64le.rpm SHA-256: 44c604f659350eb7622a7c96d03c987b38fb163e089d5465982aa56410fa5692
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.ppc64le.rpm SHA-256: ed987f031096957795a8fb9ab9cd87952e228237c4f6600982e36d725bbdf21e
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 3d0611f4a6ff0b2256a8764c31b51ae894a29ca6066266718a77cb14e9e9b1d8
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: e6bab3b30e58b844a0edb5a787f35615a13c49c52bb24999b78a9793a2fc1d53
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.ppc64le.rpm SHA-256: 0d4ec30783f58a13169cf327f097ef364219bf6a6be51078e5b029c1c8a607f8
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: fb16073830c05c25c1488cab2d20cec8e05ba9e6480435524a1f4d4c764057c4
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 837bcc6d5ab98f6805dc5b3cee69aa2af92a1187f71bf1df5595d3abd54e53b0

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
x86_64
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.x86_64.rpm SHA-256: 688e57584dd7ad34b9ff0f1d07620963d5680f7b8111f91da1686f41a649dbf6
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 8b42ff7445d821086c5f758e705c111ff34cbf8715da88162820aaa31ba66e1e
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.x86_64.rpm SHA-256: e8cd54e3b0dd6747ae41bf1cf0542475f821f037c0b163d70b8114bf52173ebb
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.x86_64.rpm SHA-256: 862eaa60d2cb80d4868cee732ed2e31238b71d4eba2493db35c6424e52460a26
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 857f618860276aa21593b8e419637fa715fc16486c450bd611b22655d698e235
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.x86_64.rpm SHA-256: 9bf31f4cef27960f670e7c5e3d103fed8c4fa36add1a6c0bfdf11d1a4f343d44
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.x86_64.rpm SHA-256: 08119cc4e8e2dcdeefa2f9032348955872af87c360292b2c1d1eee96effb1be9
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: 8b11e7e6000552aed1b9f304beb5ca12277e99888690ead9ae50517f4f203319
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: d6624bd56c646fd254f992e63e8be9fd733151ed393fae3a7f82c092f1faec87
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.x86_64.rpm SHA-256: bfee432d54fc748d353bba1522270074b338969294685737acecbc41cfa46d62
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: db0915896f44609db90ef2906f5a24dae080f731d2fb7f8bbd36b98e8c1ad77c
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: 05c6d5b49736433392df7c1f0ffbac512ecff66035b6eb00f3687bea22373130
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.x86_64.rpm SHA-256: 0d6ac844ea19b3cea7fa0423320a4dbed56af6f410a9471c753bef653ebfa0e6
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.x86_64.rpm SHA-256: fbaab96871f61e21f2f69d41ebed8126af51cb470476b5749cd91dd7a7580744
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.x86_64.rpm SHA-256: 3c0594a6cc241e7eaf6bad359a9c63fb976f7176c43fe19b82c30c94d3a5ccbd
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.x86_64.rpm SHA-256: f1f4281bf73290c4dbf20730e7fa938b79712f1345aeaea4cd65bfec2343aacc
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.x86_64.rpm SHA-256: d473d5ec2e477ce2e8415d8b6aa86c158d8afff4ed6ffc33f1cde015203d4520
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.x86_64.rpm SHA-256: 6d85443612557e68e1115001f08310bac000dd72b87df8c95b12e22be25a307b
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.x86_64.rpm SHA-256: d82ef83339e4e689c8f6edba15efbc6c5a3cc652f08b65766cefb9e8704afaeb
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.x86_64.rpm SHA-256: 54375e03aed5106b6008d4048115f4f4b17b5b543a1fca42746c23dc55b3250b
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.x86_64.rpm SHA-256: 77f1d638997593339b67476ee234936d0da081ca1f1176e6b29d856a2b64b2de
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.x86_64.rpm SHA-256: 0af90d50e52580df477d2cdd5fe3433f0b911a53dc110d34b15096753259c0d6
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 845e20832008d4777491e50497ea4e7c84554a851c0d2251565e0fa4e02a2db7
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 46fef105c499ab60f528472059beda2aaf435cdaba9f2578e720b280c7338d3d
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.x86_64.rpm SHA-256: 5259d04dbccadba9b72ba1f8d10d80158c2e171c769cddd2b98d3921e81175f4
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: 67812f45150f65a56ce9a035fe90b382a1c7bc8b33d80eaa1c316097f3ee1cc5
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: 73560fd09eaac988fef30466eac92f9e9d0abb70f7f8789ca4e7338a1424e211

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Twitter Facebook