Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:2723 - Security Advisory
Issued:
2021-07-20
Updated:
2021-07-20

RHSA-2021:2723 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer

CVEs

  • CVE-2021-33909

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2021-006
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
x86_64
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.x86_64.rpm SHA-256: 688e57584dd7ad34b9ff0f1d07620963d5680f7b8111f91da1686f41a649dbf6
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 8b42ff7445d821086c5f758e705c111ff34cbf8715da88162820aaa31ba66e1e
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.x86_64.rpm SHA-256: e8cd54e3b0dd6747ae41bf1cf0542475f821f037c0b163d70b8114bf52173ebb
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.x86_64.rpm SHA-256: 862eaa60d2cb80d4868cee732ed2e31238b71d4eba2493db35c6424e52460a26
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 857f618860276aa21593b8e419637fa715fc16486c450bd611b22655d698e235
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.x86_64.rpm SHA-256: 9bf31f4cef27960f670e7c5e3d103fed8c4fa36add1a6c0bfdf11d1a4f343d44
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.x86_64.rpm SHA-256: 08119cc4e8e2dcdeefa2f9032348955872af87c360292b2c1d1eee96effb1be9
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: 8b11e7e6000552aed1b9f304beb5ca12277e99888690ead9ae50517f4f203319
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: d6624bd56c646fd254f992e63e8be9fd733151ed393fae3a7f82c092f1faec87
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.x86_64.rpm SHA-256: bfee432d54fc748d353bba1522270074b338969294685737acecbc41cfa46d62
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: db0915896f44609db90ef2906f5a24dae080f731d2fb7f8bbd36b98e8c1ad77c
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: 05c6d5b49736433392df7c1f0ffbac512ecff66035b6eb00f3687bea22373130
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.x86_64.rpm SHA-256: 0d6ac844ea19b3cea7fa0423320a4dbed56af6f410a9471c753bef653ebfa0e6
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.x86_64.rpm SHA-256: fbaab96871f61e21f2f69d41ebed8126af51cb470476b5749cd91dd7a7580744
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.x86_64.rpm SHA-256: 3c0594a6cc241e7eaf6bad359a9c63fb976f7176c43fe19b82c30c94d3a5ccbd
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.x86_64.rpm SHA-256: f1f4281bf73290c4dbf20730e7fa938b79712f1345aeaea4cd65bfec2343aacc
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.x86_64.rpm SHA-256: d473d5ec2e477ce2e8415d8b6aa86c158d8afff4ed6ffc33f1cde015203d4520
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.x86_64.rpm SHA-256: 6d85443612557e68e1115001f08310bac000dd72b87df8c95b12e22be25a307b
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.x86_64.rpm SHA-256: d82ef83339e4e689c8f6edba15efbc6c5a3cc652f08b65766cefb9e8704afaeb
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.x86_64.rpm SHA-256: 54375e03aed5106b6008d4048115f4f4b17b5b543a1fca42746c23dc55b3250b
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.x86_64.rpm SHA-256: 77f1d638997593339b67476ee234936d0da081ca1f1176e6b29d856a2b64b2de
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.x86_64.rpm SHA-256: 0af90d50e52580df477d2cdd5fe3433f0b911a53dc110d34b15096753259c0d6
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 845e20832008d4777491e50497ea4e7c84554a851c0d2251565e0fa4e02a2db7
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 46fef105c499ab60f528472059beda2aaf435cdaba9f2578e720b280c7338d3d
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.x86_64.rpm SHA-256: 5259d04dbccadba9b72ba1f8d10d80158c2e171c769cddd2b98d3921e81175f4
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: 67812f45150f65a56ce9a035fe90b382a1c7bc8b33d80eaa1c316097f3ee1cc5
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: 73560fd09eaac988fef30466eac92f9e9d0abb70f7f8789ca4e7338a1424e211

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
ppc64le
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.ppc64le.rpm SHA-256: bdbd504487c41f1d38e421dc1b63d89ec4580b1d49c30c3d13dbc5287460e442
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: cb14c1951ecacea1e2bcfea504fd26bcee43a37bf1e8b36b7ed0e1c87e19a3f6
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: 65c24a1b43ee8fcf1bdf3c332420e4e35c1040719b9504c20a9625af35a2c923
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.ppc64le.rpm SHA-256: b18e3be4b39b6ae1238bdf557b6a9d0f53d0804df759a92eff65c91af1737b01
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: 788615133a8d141d6a3ac82ec8cc2312821efa8b6477014283a03b36e3ad1113
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: fc9815e423f603739f7e9bedab4c58ae17f2f23eff7e66c2f8a4c54e4b468801
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.ppc64le.rpm SHA-256: 1be89293402553fa24c815a690e988772a094320fda34397c23e8a144a0277f5
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: 55edd8d6a35d71ee9101cc4d0412b3e99d859afe8b942270f03ab8a890a221ac
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: e892d1b6038bf4fd1baa205c8a79ab5519baa0729c3f16b1702c618dc11ac02e
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.ppc64le.rpm SHA-256: 26fa83901a75ca00225ca3bc0a2e0cba9c062875b41a0c69e949a1445423e6ba
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: cb81252a1b778b79dc5be9bd957deff5cc1c88bdf567b424d2e4f4f5ee8d5037
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: ad479f1c00ba0301c2c4e02ab9e9ed19209123bd6744d600c2728de29061ae2f
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.ppc64le.rpm SHA-256: cecddbea42179fdf72f870bfe15a9319644047ab592af3efc881838f42536940
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.ppc64le.rpm SHA-256: e38d9572e7acd4f15e07be0ca869700ef2738a858a4f2b020e20f71d724a670b
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.ppc64le.rpm SHA-256: 4c8eaa7ae7271ee99c7b956d37c120e260d4d36d8c5593b1e10d50524fdd0bec
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.ppc64le.rpm SHA-256: 94b4027d65e38a3f13e3bbedcb1f8a86fd79e7fd965f4cb5b6f32f6465448813
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.ppc64le.rpm SHA-256: daca55b6f027af719f53ab9ac09e035175d31dead33605ec40abd91754f56e6c
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.ppc64le.rpm SHA-256: 0da1bc1207dfba5f7d9c296432613ccb6b6fce48fe7a7a6981b61084932b0b02
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.ppc64le.rpm SHA-256: 142efdb4563d48f9ebd1be1a2131f8b03d557b8b24345c95a5c2db4d5bf15dfe
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.ppc64le.rpm SHA-256: 2313244bd99881f751d3241fc830959aa6b3268af436a55a0c2cfe94ff5d9c52
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.ppc64le.rpm SHA-256: 44c604f659350eb7622a7c96d03c987b38fb163e089d5465982aa56410fa5692
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.ppc64le.rpm SHA-256: ed987f031096957795a8fb9ab9cd87952e228237c4f6600982e36d725bbdf21e
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 3d0611f4a6ff0b2256a8764c31b51ae894a29ca6066266718a77cb14e9e9b1d8
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: e6bab3b30e58b844a0edb5a787f35615a13c49c52bb24999b78a9793a2fc1d53
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.ppc64le.rpm SHA-256: 0d4ec30783f58a13169cf327f097ef364219bf6a6be51078e5b029c1c8a607f8
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: fb16073830c05c25c1488cab2d20cec8e05ba9e6480435524a1f4d4c764057c4
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 837bcc6d5ab98f6805dc5b3cee69aa2af92a1187f71bf1df5595d3abd54e53b0

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
ppc64le
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.ppc64le.rpm SHA-256: bdbd504487c41f1d38e421dc1b63d89ec4580b1d49c30c3d13dbc5287460e442
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: cb14c1951ecacea1e2bcfea504fd26bcee43a37bf1e8b36b7ed0e1c87e19a3f6
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: 65c24a1b43ee8fcf1bdf3c332420e4e35c1040719b9504c20a9625af35a2c923
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.ppc64le.rpm SHA-256: b18e3be4b39b6ae1238bdf557b6a9d0f53d0804df759a92eff65c91af1737b01
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.ppc64le.rpm SHA-256: 788615133a8d141d6a3ac82ec8cc2312821efa8b6477014283a03b36e3ad1113
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.ppc64le.rpm SHA-256: fc9815e423f603739f7e9bedab4c58ae17f2f23eff7e66c2f8a4c54e4b468801
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.ppc64le.rpm SHA-256: 1be89293402553fa24c815a690e988772a094320fda34397c23e8a144a0277f5
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: 55edd8d6a35d71ee9101cc4d0412b3e99d859afe8b942270f03ab8a890a221ac
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: e892d1b6038bf4fd1baa205c8a79ab5519baa0729c3f16b1702c618dc11ac02e
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.ppc64le.rpm SHA-256: 26fa83901a75ca00225ca3bc0a2e0cba9c062875b41a0c69e949a1445423e6ba
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.ppc64le.rpm SHA-256: cb81252a1b778b79dc5be9bd957deff5cc1c88bdf567b424d2e4f4f5ee8d5037
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.ppc64le.rpm SHA-256: ad479f1c00ba0301c2c4e02ab9e9ed19209123bd6744d600c2728de29061ae2f
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.ppc64le.rpm SHA-256: cecddbea42179fdf72f870bfe15a9319644047ab592af3efc881838f42536940
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.ppc64le.rpm SHA-256: e38d9572e7acd4f15e07be0ca869700ef2738a858a4f2b020e20f71d724a670b
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.ppc64le.rpm SHA-256: 4c8eaa7ae7271ee99c7b956d37c120e260d4d36d8c5593b1e10d50524fdd0bec
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.ppc64le.rpm SHA-256: 94b4027d65e38a3f13e3bbedcb1f8a86fd79e7fd965f4cb5b6f32f6465448813
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.ppc64le.rpm SHA-256: daca55b6f027af719f53ab9ac09e035175d31dead33605ec40abd91754f56e6c
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.ppc64le.rpm SHA-256: 0da1bc1207dfba5f7d9c296432613ccb6b6fce48fe7a7a6981b61084932b0b02
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.ppc64le.rpm SHA-256: 142efdb4563d48f9ebd1be1a2131f8b03d557b8b24345c95a5c2db4d5bf15dfe
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.ppc64le.rpm SHA-256: 2313244bd99881f751d3241fc830959aa6b3268af436a55a0c2cfe94ff5d9c52
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.ppc64le.rpm SHA-256: 44c604f659350eb7622a7c96d03c987b38fb163e089d5465982aa56410fa5692
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.ppc64le.rpm SHA-256: ed987f031096957795a8fb9ab9cd87952e228237c4f6600982e36d725bbdf21e
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.ppc64le.rpm SHA-256: 3d0611f4a6ff0b2256a8764c31b51ae894a29ca6066266718a77cb14e9e9b1d8
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.ppc64le.rpm SHA-256: e6bab3b30e58b844a0edb5a787f35615a13c49c52bb24999b78a9793a2fc1d53
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.ppc64le.rpm SHA-256: 0d4ec30783f58a13169cf327f097ef364219bf6a6be51078e5b029c1c8a607f8
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.ppc64le.rpm SHA-256: fb16073830c05c25c1488cab2d20cec8e05ba9e6480435524a1f4d4c764057c4
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.ppc64le.rpm SHA-256: 837bcc6d5ab98f6805dc5b3cee69aa2af92a1187f71bf1df5595d3abd54e53b0

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.src.rpm SHA-256: c5202430080ce6812f36fbf7aba55e1bdc748923dd5ff84369cb4d2c44a3cd5c
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.src.rpm SHA-256: 68cd1ee42e63273f500df71948f126c69c76192c53e2a81bf81f72e6445d2e9d
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.src.rpm SHA-256: 30028a56522848476bd94d16328464f0fecd82d0ecf75ea3a609f598d17ff871
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.src.rpm SHA-256: 1234a575a6e28552cf58b204ec3a766a4b8252e54a50c348633ebbb10fad9b82
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.src.rpm SHA-256: b2c2f8f8aa6a012fc1e50566db1e9163fc38bb3f1ce6b19e4d05b56dc02fd503
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.src.rpm SHA-256: ecc5ed403a5b6d83ac52978fae5415369e9ce01693e41422f1801a0b45b90b8a
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.src.rpm SHA-256: b6d9bee1301e2063c0c527eaecc0b6b254cfe23ac044353ebd065c0b783adb37
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.src.rpm SHA-256: c5d05a2b7d555f81cff4e2351e23919c385ccdffbbf3572cc5d9a1d81df83ac5
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.src.rpm SHA-256: 589cfd638794bec8769c39835a9d89a319bd0637a418c0444b889f2cf51bb0f7
x86_64
kpatch-patch-4_18_0-147_24_2-1-11.el8_1.x86_64.rpm SHA-256: 688e57584dd7ad34b9ff0f1d07620963d5680f7b8111f91da1686f41a649dbf6
kpatch-patch-4_18_0-147_24_2-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 8b42ff7445d821086c5f758e705c111ff34cbf8715da88162820aaa31ba66e1e
kpatch-patch-4_18_0-147_24_2-debugsource-1-11.el8_1.x86_64.rpm SHA-256: e8cd54e3b0dd6747ae41bf1cf0542475f821f037c0b163d70b8114bf52173ebb
kpatch-patch-4_18_0-147_27_1-1-11.el8_1.x86_64.rpm SHA-256: 862eaa60d2cb80d4868cee732ed2e31238b71d4eba2493db35c6424e52460a26
kpatch-patch-4_18_0-147_27_1-debuginfo-1-11.el8_1.x86_64.rpm SHA-256: 857f618860276aa21593b8e419637fa715fc16486c450bd611b22655d698e235
kpatch-patch-4_18_0-147_27_1-debugsource-1-11.el8_1.x86_64.rpm SHA-256: 9bf31f4cef27960f670e7c5e3d103fed8c4fa36add1a6c0bfdf11d1a4f343d44
kpatch-patch-4_18_0-147_32_1-1-9.el8_1.x86_64.rpm SHA-256: 08119cc4e8e2dcdeefa2f9032348955872af87c360292b2c1d1eee96effb1be9
kpatch-patch-4_18_0-147_32_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: 8b11e7e6000552aed1b9f304beb5ca12277e99888690ead9ae50517f4f203319
kpatch-patch-4_18_0-147_32_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: d6624bd56c646fd254f992e63e8be9fd733151ed393fae3a7f82c092f1faec87
kpatch-patch-4_18_0-147_34_1-1-9.el8_1.x86_64.rpm SHA-256: bfee432d54fc748d353bba1522270074b338969294685737acecbc41cfa46d62
kpatch-patch-4_18_0-147_34_1-debuginfo-1-9.el8_1.x86_64.rpm SHA-256: db0915896f44609db90ef2906f5a24dae080f731d2fb7f8bbd36b98e8c1ad77c
kpatch-patch-4_18_0-147_34_1-debugsource-1-9.el8_1.x86_64.rpm SHA-256: 05c6d5b49736433392df7c1f0ffbac512ecff66035b6eb00f3687bea22373130
kpatch-patch-4_18_0-147_38_1-1-8.el8_1.x86_64.rpm SHA-256: 0d6ac844ea19b3cea7fa0423320a4dbed56af6f410a9471c753bef653ebfa0e6
kpatch-patch-4_18_0-147_38_1-debuginfo-1-8.el8_1.x86_64.rpm SHA-256: fbaab96871f61e21f2f69d41ebed8126af51cb470476b5749cd91dd7a7580744
kpatch-patch-4_18_0-147_38_1-debugsource-1-8.el8_1.x86_64.rpm SHA-256: 3c0594a6cc241e7eaf6bad359a9c63fb976f7176c43fe19b82c30c94d3a5ccbd
kpatch-patch-4_18_0-147_43_1-1-6.el8_1.x86_64.rpm SHA-256: f1f4281bf73290c4dbf20730e7fa938b79712f1345aeaea4cd65bfec2343aacc
kpatch-patch-4_18_0-147_43_1-debuginfo-1-6.el8_1.x86_64.rpm SHA-256: d473d5ec2e477ce2e8415d8b6aa86c158d8afff4ed6ffc33f1cde015203d4520
kpatch-patch-4_18_0-147_43_1-debugsource-1-6.el8_1.x86_64.rpm SHA-256: 6d85443612557e68e1115001f08310bac000dd72b87df8c95b12e22be25a307b
kpatch-patch-4_18_0-147_44_1-1-5.el8_1.x86_64.rpm SHA-256: d82ef83339e4e689c8f6edba15efbc6c5a3cc652f08b65766cefb9e8704afaeb
kpatch-patch-4_18_0-147_44_1-debuginfo-1-5.el8_1.x86_64.rpm SHA-256: 54375e03aed5106b6008d4048115f4f4b17b5b543a1fca42746c23dc55b3250b
kpatch-patch-4_18_0-147_44_1-debugsource-1-5.el8_1.x86_64.rpm SHA-256: 77f1d638997593339b67476ee234936d0da081ca1f1176e6b29d856a2b64b2de
kpatch-patch-4_18_0-147_48_1-1-2.el8_1.x86_64.rpm SHA-256: 0af90d50e52580df477d2cdd5fe3433f0b911a53dc110d34b15096753259c0d6
kpatch-patch-4_18_0-147_48_1-debuginfo-1-2.el8_1.x86_64.rpm SHA-256: 845e20832008d4777491e50497ea4e7c84554a851c0d2251565e0fa4e02a2db7
kpatch-patch-4_18_0-147_48_1-debugsource-1-2.el8_1.x86_64.rpm SHA-256: 46fef105c499ab60f528472059beda2aaf435cdaba9f2578e720b280c7338d3d
kpatch-patch-4_18_0-147_51_1-1-1.el8_1.x86_64.rpm SHA-256: 5259d04dbccadba9b72ba1f8d10d80158c2e171c769cddd2b98d3921e81175f4
kpatch-patch-4_18_0-147_51_1-debuginfo-1-1.el8_1.x86_64.rpm SHA-256: 67812f45150f65a56ce9a035fe90b382a1c7bc8b33d80eaa1c316097f3ee1cc5
kpatch-patch-4_18_0-147_51_1-debugsource-1-1.el8_1.x86_64.rpm SHA-256: 73560fd09eaac988fef30466eac92f9e9d0abb70f7f8789ca4e7338a1424e211

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility