Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:3436 - Security Advisory
Issued:
2021-09-07
Updated:
2021-09-07

RHSA-2021:3436 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le

Fixes

  • BZ - 1986506 - CVE-2021-37576 kernel: powerpc: KVM guest OS users can cause host OS memory corruption

CVEs

  • CVE-2021-37576

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
ppc64le
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305-1-5.el8.src.rpm SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility