- Issued:
- 2021-09-07
- Updated:
- 2021-09-07
RHSA-2021:3436 - Security Advisory
Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
Fixes
- BZ - 1986506 - CVE-2021-37576 kernel: powerpc: KVM guest OS users can cause host OS memory corruption
CVEs
Red Hat Enterprise Linux for x86_64 8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux Server - AUS 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux Server - AUS 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for Power, little endian 8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux Server - TUS 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux Server - TUS 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux Server - TUS 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
ppc64le | |
kpatch-patch-4_18_0-305-1-5.el8.ppc64le.rpm | SHA-256: 73907a06f832a4f3b2f79266a4aaa320164929262ae574cc02b772dd739d6646 |
kpatch-patch-4_18_0-305-debuginfo-1-5.el8.ppc64le.rpm | SHA-256: d5d8764aec00662bd13f6b9b0a4afa0d00f0fe6ca24e580a037ad1a28e7f9807 |
kpatch-patch-4_18_0-305-debugsource-1-5.el8.ppc64le.rpm | SHA-256: 1e410e3a59c324fa29d8944b8df58f92ef1c170fde25d4c849058139ed7bf5c6 |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.ppc64le.rpm | SHA-256: 6d1065520237e4b82b1e009cff64ec905e2d7d7db89bb9bfeec75d70257f26e3 |
kpatch-patch-4_18_0-305_10_2-debuginfo-1-2.el8_4.ppc64le.rpm | SHA-256: a09ad6b97c532446c0fedabc9a1c595f2f51da6991172d60171f2ba56593594b |
kpatch-patch-4_18_0-305_10_2-debugsource-1-2.el8_4.ppc64le.rpm | SHA-256: 0e4e5913984bd4781eda60a21a7a8cb205b284ff9912ec39d35885fafcec15fc |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.ppc64le.rpm | SHA-256: 000a1eb744ba64b0790c7c876c17ee62a4fbea140f87ec56794f020628da85f2 |
kpatch-patch-4_18_0-305_12_1-debuginfo-1-1.el8_4.ppc64le.rpm | SHA-256: c5ea95a0115a858f584dd828ccfb3860a7ad60289b03c461372475274571afbc |
kpatch-patch-4_18_0-305_12_1-debugsource-1-1.el8_4.ppc64le.rpm | SHA-256: fe99af533bdb21719a3ee6ce94a63fa7ff81cc1d84645a63592b6600f2872464 |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.ppc64le.rpm | SHA-256: 5604c8ab058b2779c6fc3684247c1cbe62c08c56c4ea28d2519ff4a9a43254f6 |
kpatch-patch-4_18_0-305_3_1-debuginfo-1-4.el8_4.ppc64le.rpm | SHA-256: 50fcde82f18cb689a5b86ce65eed3223e256e7b270da0615806bde7f4169793a |
kpatch-patch-4_18_0-305_3_1-debugsource-1-4.el8_4.ppc64le.rpm | SHA-256: 9541e1d0dad8e16e1dd4b53ef9c5b2e480f8e0b9aecc3a51f8391037b9dbc933 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.ppc64le.rpm | SHA-256: f414b1469eff7e7c16bddff5a757318db61b9fff3d0ce48d615301b05be04c3a |
kpatch-patch-4_18_0-305_7_1-debuginfo-1-3.el8_4.ppc64le.rpm | SHA-256: 08d0a9f3beaa65c6d89a38ba624d942779884e2c947b2daaae6107b022191bbe |
kpatch-patch-4_18_0-305_7_1-debugsource-1-3.el8_4.ppc64le.rpm | SHA-256: 53d809b40521d417c8b7535e3ee51893f637622b4b89680aac09ea3726587025 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
kpatch-patch-4_18_0-305-1-5.el8.src.rpm | SHA-256: f26d9668d3a775b2f82ec86169cccdf408f1f32dee180c82cde1e3a8c1fad0ab |
kpatch-patch-4_18_0-305_10_2-1-2.el8_4.src.rpm | SHA-256: fe3897b7e7d8f07f39bd768b8d5f4f0b9efb839f9559e66d1f206196efc30bbb |
kpatch-patch-4_18_0-305_12_1-1-1.el8_4.src.rpm | SHA-256: ddca1464ead6ed5e5b253fd251fe8ff66befdd09b3de368ad43d3f8b6cb83b2d |
kpatch-patch-4_18_0-305_3_1-1-4.el8_4.src.rpm | SHA-256: 67c4e80fb8caf53995365a47c83403339892c46ea6d7add550717a4716e86463 |
kpatch-patch-4_18_0-305_7_1-1-3.el8_4.src.rpm | SHA-256: 674f5aef8e4ff151751bdc99d8e911a171e1ce0baa6961f50b9f1f6c996aede3 |
x86_64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.