Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2021:3044 - Security Advisory
Issued:
2021-08-10
Updated:
2021-08-10

RHSA-2021:3044 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)
  • kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
  • kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 1965461 - CVE-2021-22543 kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks
  • BZ - 1971651 - CVE-2021-3609 kernel: race condition in net/can/bcm.c leads to local privilege escalation
  • BZ - 1980101 - CVE-2021-22555 kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c

CVEs

  • CVE-2021-3609
  • CVE-2021-22543
  • CVE-2021-22555

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
ppc64le
kpatch-patch-4_18_0-305-1-4.el8.ppc64le.rpm SHA-256: 9eef9a69f3e14a6668d993faaf8ff18844d2d48f3684c16714134c824873ad77
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 090e3cce74f1ae61782105440c9ebe7411be2939579c74bf1c84d70c9e6d0159
kpatch-patch-4_18_0-305-debugsource-1-4.el8.ppc64le.rpm SHA-256: 45db2cba3edd322f3bbd177d66fccf8bb7a11048d8a446db8eec4ce6cd00d534
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.ppc64le.rpm SHA-256: c3a807ed0854f594dd25d783b20635b935cdd51916985796eb1a4b2e3dc533de
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 1be3be740b20abab9cf8c44c41dfb9b6718f0743b3e361bda24bb3502ef2b8bc
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: ba53e97e78f08a9395919c216744226c7343c8ff6aee1e85b864e3cfa093aad8
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.ppc64le.rpm SHA-256: bba49d8d38c829e4d10454d4772dabead17bbaeab74890b3060a2ee3204c52f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 5dc2db2110e64c1c34b69d5845b318d928ea5fd7ea60109c30fc559f4eef6a1b
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: e37cd1a7f89615bfd05bcc0b9b93c9a46f9866fcb27592c335f419e36e7fbaa1
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.ppc64le.rpm SHA-256: 94af3badf559097430d4712e150f8aced2ce6ddeab9cab707433ac33fe99cf91
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 28d0eefeff8d86a96d1d153bff3321587f6943d9596f993bcf1f4e4a79c7e782
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: dee404df507792fa018bc3883f8a529d0f0b25bd5765a0b3f570f9f2e3e45822

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
ppc64le
kpatch-patch-4_18_0-305-1-4.el8.ppc64le.rpm SHA-256: 9eef9a69f3e14a6668d993faaf8ff18844d2d48f3684c16714134c824873ad77
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 090e3cce74f1ae61782105440c9ebe7411be2939579c74bf1c84d70c9e6d0159
kpatch-patch-4_18_0-305-debugsource-1-4.el8.ppc64le.rpm SHA-256: 45db2cba3edd322f3bbd177d66fccf8bb7a11048d8a446db8eec4ce6cd00d534
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.ppc64le.rpm SHA-256: c3a807ed0854f594dd25d783b20635b935cdd51916985796eb1a4b2e3dc533de
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 1be3be740b20abab9cf8c44c41dfb9b6718f0743b3e361bda24bb3502ef2b8bc
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: ba53e97e78f08a9395919c216744226c7343c8ff6aee1e85b864e3cfa093aad8
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.ppc64le.rpm SHA-256: bba49d8d38c829e4d10454d4772dabead17bbaeab74890b3060a2ee3204c52f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 5dc2db2110e64c1c34b69d5845b318d928ea5fd7ea60109c30fc559f4eef6a1b
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: e37cd1a7f89615bfd05bcc0b9b93c9a46f9866fcb27592c335f419e36e7fbaa1
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.ppc64le.rpm SHA-256: 94af3badf559097430d4712e150f8aced2ce6ddeab9cab707433ac33fe99cf91
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 28d0eefeff8d86a96d1d153bff3321587f6943d9596f993bcf1f4e4a79c7e782
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: dee404df507792fa018bc3883f8a529d0f0b25bd5765a0b3f570f9f2e3e45822

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
ppc64le
kpatch-patch-4_18_0-305-1-4.el8.ppc64le.rpm SHA-256: 9eef9a69f3e14a6668d993faaf8ff18844d2d48f3684c16714134c824873ad77
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 090e3cce74f1ae61782105440c9ebe7411be2939579c74bf1c84d70c9e6d0159
kpatch-patch-4_18_0-305-debugsource-1-4.el8.ppc64le.rpm SHA-256: 45db2cba3edd322f3bbd177d66fccf8bb7a11048d8a446db8eec4ce6cd00d534
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.ppc64le.rpm SHA-256: c3a807ed0854f594dd25d783b20635b935cdd51916985796eb1a4b2e3dc533de
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 1be3be740b20abab9cf8c44c41dfb9b6718f0743b3e361bda24bb3502ef2b8bc
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: ba53e97e78f08a9395919c216744226c7343c8ff6aee1e85b864e3cfa093aad8
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.ppc64le.rpm SHA-256: bba49d8d38c829e4d10454d4772dabead17bbaeab74890b3060a2ee3204c52f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 5dc2db2110e64c1c34b69d5845b318d928ea5fd7ea60109c30fc559f4eef6a1b
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: e37cd1a7f89615bfd05bcc0b9b93c9a46f9866fcb27592c335f419e36e7fbaa1
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.ppc64le.rpm SHA-256: 94af3badf559097430d4712e150f8aced2ce6ddeab9cab707433ac33fe99cf91
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 28d0eefeff8d86a96d1d153bff3321587f6943d9596f993bcf1f4e4a79c7e782
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: dee404df507792fa018bc3883f8a529d0f0b25bd5765a0b3f570f9f2e3e45822

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
ppc64le
kpatch-patch-4_18_0-305-1-4.el8.ppc64le.rpm SHA-256: 9eef9a69f3e14a6668d993faaf8ff18844d2d48f3684c16714134c824873ad77
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 090e3cce74f1ae61782105440c9ebe7411be2939579c74bf1c84d70c9e6d0159
kpatch-patch-4_18_0-305-debugsource-1-4.el8.ppc64le.rpm SHA-256: 45db2cba3edd322f3bbd177d66fccf8bb7a11048d8a446db8eec4ce6cd00d534
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.ppc64le.rpm SHA-256: c3a807ed0854f594dd25d783b20635b935cdd51916985796eb1a4b2e3dc533de
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 1be3be740b20abab9cf8c44c41dfb9b6718f0743b3e361bda24bb3502ef2b8bc
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: ba53e97e78f08a9395919c216744226c7343c8ff6aee1e85b864e3cfa093aad8
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.ppc64le.rpm SHA-256: bba49d8d38c829e4d10454d4772dabead17bbaeab74890b3060a2ee3204c52f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 5dc2db2110e64c1c34b69d5845b318d928ea5fd7ea60109c30fc559f4eef6a1b
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: e37cd1a7f89615bfd05bcc0b9b93c9a46f9866fcb27592c335f419e36e7fbaa1
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.ppc64le.rpm SHA-256: 94af3badf559097430d4712e150f8aced2ce6ddeab9cab707433ac33fe99cf91
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 28d0eefeff8d86a96d1d153bff3321587f6943d9596f993bcf1f4e4a79c7e782
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: dee404df507792fa018bc3883f8a529d0f0b25bd5765a0b3f570f9f2e3e45822

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
ppc64le
kpatch-patch-4_18_0-305-1-4.el8.ppc64le.rpm SHA-256: 9eef9a69f3e14a6668d993faaf8ff18844d2d48f3684c16714134c824873ad77
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 090e3cce74f1ae61782105440c9ebe7411be2939579c74bf1c84d70c9e6d0159
kpatch-patch-4_18_0-305-debugsource-1-4.el8.ppc64le.rpm SHA-256: 45db2cba3edd322f3bbd177d66fccf8bb7a11048d8a446db8eec4ce6cd00d534
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.ppc64le.rpm SHA-256: c3a807ed0854f594dd25d783b20635b935cdd51916985796eb1a4b2e3dc533de
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 1be3be740b20abab9cf8c44c41dfb9b6718f0743b3e361bda24bb3502ef2b8bc
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: ba53e97e78f08a9395919c216744226c7343c8ff6aee1e85b864e3cfa093aad8
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.ppc64le.rpm SHA-256: bba49d8d38c829e4d10454d4772dabead17bbaeab74890b3060a2ee3204c52f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 5dc2db2110e64c1c34b69d5845b318d928ea5fd7ea60109c30fc559f4eef6a1b
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: e37cd1a7f89615bfd05bcc0b9b93c9a46f9866fcb27592c335f419e36e7fbaa1
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.ppc64le.rpm SHA-256: 94af3badf559097430d4712e150f8aced2ce6ddeab9cab707433ac33fe99cf91
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 28d0eefeff8d86a96d1d153bff3321587f6943d9596f993bcf1f4e4a79c7e782
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: dee404df507792fa018bc3883f8a529d0f0b25bd5765a0b3f570f9f2e3e45822

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305-1-4.el8.src.rpm SHA-256: 2968e6a8c634bc67bc94846f6f6d6ecc8cc24117aaf10e0e10ef64bf187435d9
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.src.rpm SHA-256: 1cdc99d9cf3cda73236f1fbce1364ede46a155aa5021cf042dbe66dd5cae0599
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.src.rpm SHA-256: 11a957d58aa228f0bfa99cd58154e13e709a4aeda0e1a0884538f3b27000158b
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.src.rpm SHA-256: 1529d52658eb6ce737c51efc495bf0eec010a370d8ae17b4d04ff73eaab513b7
x86_64
kpatch-patch-4_18_0-305-1-4.el8.x86_64.rpm SHA-256: 87ab10775b817bac5d66d49853af526a5a826bf10bb38db46195a08ca0312c0a
kpatch-patch-4_18_0-305-debuginfo-1-4.el8.x86_64.rpm SHA-256: 9617595076e05b9c3627234fa60131736bbbc2a81aa1733824df1443ed4c7fc0
kpatch-patch-4_18_0-305-debugsource-1-4.el8.x86_64.rpm SHA-256: 83e3783c64775ca23c63ff69ee621eb255a0514687812e49d0d0c7549444ffc8
kpatch-patch-4_18_0-305_10_2-1-1.el8_4.x86_64.rpm SHA-256: fa7783c224286a57458595655c046075837c76b65d323f332f5b8832ffe1924c
kpatch-patch-4_18_0-305_10_2-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 028614380db9204a8608e9928ae5d5cf791218775dbe307aee9653f0784d041d
kpatch-patch-4_18_0-305_10_2-debugsource-1-1.el8_4.x86_64.rpm SHA-256: 024558b4eb04e46deb7719768cd88ef2e8828e98e28e479b1c39da5d1ac61ea0
kpatch-patch-4_18_0-305_3_1-1-3.el8_4.x86_64.rpm SHA-256: ae40229fa343d90cdf3893f1c7dea59a5ac8384c7588b89bd03a3c8586d902ef
kpatch-patch-4_18_0-305_3_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 089910176a0dec47a0f32f96214dabaa08a8e0e61e2fe0b5b5bdb9fc1f2e6d50
kpatch-patch-4_18_0-305_3_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: f363855bf3547de283e94a6edc811ecf9b1a2d80281ef14ed7c8d9154b9d06be
kpatch-patch-4_18_0-305_7_1-1-2.el8_4.x86_64.rpm SHA-256: 49683fabd87a8859bb3434eba448fd5517f488297629d94de5712ffe184d2f4a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: a7510ab5a790fd933e6cd03ac7102f3e62cf83b28753795e9fe02238807a8224
kpatch-patch-4_18_0-305_7_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 3af359c532d3a97375f37ac02c2460bb3b09d31ee36ddf5ec7aac29d84991943

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter