Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:0849 - Security Advisory
Issued:
2022-03-14
Updated:
2022-03-14

RHSA-2022:0849 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
  • kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154)
  • kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
  • kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)
  • kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
  • kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2031930 - CVE-2021-0920 kernel: Use After Free in unix_gc() which could result in a local privilege escalation
  • BZ - 2034514 - CVE-2021-4154 kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout
  • BZ - 2042404 - CVE-2022-0330 kernel: possible privileges escalation due to missing TLB flush
  • BZ - 2044809 - CVE-2022-22942 kernel: failing usercopy allows for use-after-free exploitation
  • BZ - 2048738 - CVE-2022-0435 kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
  • BZ - 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation

CVEs

  • CVE-2021-0920
  • CVE-2021-4154
  • CVE-2022-0330
  • CVE-2022-0435
  • CVE-2022-0492
  • CVE-2022-22942

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
ppc64le
kpatch-patch-4_18_0-348-1-3.el8.ppc64le.rpm SHA-256: dcb6d5a2b7c025d0e8ca3cb1f8e173748a9eefaffa879123ea781f0e05892d49
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.ppc64le.rpm SHA-256: 29e9d57c9b9f31ae6412bd46fd166b186c9f553098422fb1ebfbe49f44db1584
kpatch-patch-4_18_0-348-debugsource-1-3.el8.ppc64le.rpm SHA-256: 5e566f75dac197b653dbea25e3a11355419ce87fa1125014a08c8a1ea308caa6
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.ppc64le.rpm SHA-256: f1c81a0cccc9d69d3514d2c865b12bd716b436489af448c9a156e0af15967396
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: e72c097cb7a5b4c14eb481c7071d3de5b560f599d4c14b40a12db9eaf185db2c
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: ba1ec625c5603b47698421f491053b3102107d2b015142cd96a44a39a59a293b
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.ppc64le.rpm SHA-256: 96311f67c7ef94cc156237605d408be999b939c54c96de97e92f604c82737474
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 5dfbd488bb55bcaa378a75c31d4107c6d405cb46fc1404e92ad354a3c4ac9920
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 1f441da985039c5918d39dc45be0f524847c5dd337f1ea890b0aee492596b37d
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.ppc64le.rpm SHA-256: c95fe5ac3f2c01b8dafcff90f94ca0b66e56d29c6f97339180beafe72b681260
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 04ed1b7dea84ea845189b81ec0ec7dfad5d0e79a3cb4f973f4328218b9a2bafe
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 9ebb25bc2eaf8a30b35c8a2d7031b67757afbcc18355052cafefcda970532f3a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
ppc64le
kpatch-patch-4_18_0-348-1-3.el8.ppc64le.rpm SHA-256: dcb6d5a2b7c025d0e8ca3cb1f8e173748a9eefaffa879123ea781f0e05892d49
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.ppc64le.rpm SHA-256: 29e9d57c9b9f31ae6412bd46fd166b186c9f553098422fb1ebfbe49f44db1584
kpatch-patch-4_18_0-348-debugsource-1-3.el8.ppc64le.rpm SHA-256: 5e566f75dac197b653dbea25e3a11355419ce87fa1125014a08c8a1ea308caa6
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.ppc64le.rpm SHA-256: f1c81a0cccc9d69d3514d2c865b12bd716b436489af448c9a156e0af15967396
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: e72c097cb7a5b4c14eb481c7071d3de5b560f599d4c14b40a12db9eaf185db2c
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: ba1ec625c5603b47698421f491053b3102107d2b015142cd96a44a39a59a293b
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.ppc64le.rpm SHA-256: 96311f67c7ef94cc156237605d408be999b939c54c96de97e92f604c82737474
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 5dfbd488bb55bcaa378a75c31d4107c6d405cb46fc1404e92ad354a3c4ac9920
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 1f441da985039c5918d39dc45be0f524847c5dd337f1ea890b0aee492596b37d
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.ppc64le.rpm SHA-256: c95fe5ac3f2c01b8dafcff90f94ca0b66e56d29c6f97339180beafe72b681260
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 04ed1b7dea84ea845189b81ec0ec7dfad5d0e79a3cb4f973f4328218b9a2bafe
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 9ebb25bc2eaf8a30b35c8a2d7031b67757afbcc18355052cafefcda970532f3a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
ppc64le
kpatch-patch-4_18_0-348-1-3.el8.ppc64le.rpm SHA-256: dcb6d5a2b7c025d0e8ca3cb1f8e173748a9eefaffa879123ea781f0e05892d49
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.ppc64le.rpm SHA-256: 29e9d57c9b9f31ae6412bd46fd166b186c9f553098422fb1ebfbe49f44db1584
kpatch-patch-4_18_0-348-debugsource-1-3.el8.ppc64le.rpm SHA-256: 5e566f75dac197b653dbea25e3a11355419ce87fa1125014a08c8a1ea308caa6
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.ppc64le.rpm SHA-256: f1c81a0cccc9d69d3514d2c865b12bd716b436489af448c9a156e0af15967396
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: e72c097cb7a5b4c14eb481c7071d3de5b560f599d4c14b40a12db9eaf185db2c
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: ba1ec625c5603b47698421f491053b3102107d2b015142cd96a44a39a59a293b
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.ppc64le.rpm SHA-256: 96311f67c7ef94cc156237605d408be999b939c54c96de97e92f604c82737474
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 5dfbd488bb55bcaa378a75c31d4107c6d405cb46fc1404e92ad354a3c4ac9920
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 1f441da985039c5918d39dc45be0f524847c5dd337f1ea890b0aee492596b37d
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.ppc64le.rpm SHA-256: c95fe5ac3f2c01b8dafcff90f94ca0b66e56d29c6f97339180beafe72b681260
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 04ed1b7dea84ea845189b81ec0ec7dfad5d0e79a3cb4f973f4328218b9a2bafe
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 9ebb25bc2eaf8a30b35c8a2d7031b67757afbcc18355052cafefcda970532f3a

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
ppc64le
kpatch-patch-4_18_0-348-1-3.el8.ppc64le.rpm SHA-256: dcb6d5a2b7c025d0e8ca3cb1f8e173748a9eefaffa879123ea781f0e05892d49
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.ppc64le.rpm SHA-256: 29e9d57c9b9f31ae6412bd46fd166b186c9f553098422fb1ebfbe49f44db1584
kpatch-patch-4_18_0-348-debugsource-1-3.el8.ppc64le.rpm SHA-256: 5e566f75dac197b653dbea25e3a11355419ce87fa1125014a08c8a1ea308caa6
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.ppc64le.rpm SHA-256: f1c81a0cccc9d69d3514d2c865b12bd716b436489af448c9a156e0af15967396
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: e72c097cb7a5b4c14eb481c7071d3de5b560f599d4c14b40a12db9eaf185db2c
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: ba1ec625c5603b47698421f491053b3102107d2b015142cd96a44a39a59a293b
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.ppc64le.rpm SHA-256: 96311f67c7ef94cc156237605d408be999b939c54c96de97e92f604c82737474
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 5dfbd488bb55bcaa378a75c31d4107c6d405cb46fc1404e92ad354a3c4ac9920
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 1f441da985039c5918d39dc45be0f524847c5dd337f1ea890b0aee492596b37d
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.ppc64le.rpm SHA-256: c95fe5ac3f2c01b8dafcff90f94ca0b66e56d29c6f97339180beafe72b681260
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 04ed1b7dea84ea845189b81ec0ec7dfad5d0e79a3cb4f973f4328218b9a2bafe
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 9ebb25bc2eaf8a30b35c8a2d7031b67757afbcc18355052cafefcda970532f3a

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
ppc64le
kpatch-patch-4_18_0-348-1-3.el8.ppc64le.rpm SHA-256: dcb6d5a2b7c025d0e8ca3cb1f8e173748a9eefaffa879123ea781f0e05892d49
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.ppc64le.rpm SHA-256: 29e9d57c9b9f31ae6412bd46fd166b186c9f553098422fb1ebfbe49f44db1584
kpatch-patch-4_18_0-348-debugsource-1-3.el8.ppc64le.rpm SHA-256: 5e566f75dac197b653dbea25e3a11355419ce87fa1125014a08c8a1ea308caa6
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.ppc64le.rpm SHA-256: f1c81a0cccc9d69d3514d2c865b12bd716b436489af448c9a156e0af15967396
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: e72c097cb7a5b4c14eb481c7071d3de5b560f599d4c14b40a12db9eaf185db2c
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: ba1ec625c5603b47698421f491053b3102107d2b015142cd96a44a39a59a293b
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.ppc64le.rpm SHA-256: 96311f67c7ef94cc156237605d408be999b939c54c96de97e92f604c82737474
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 5dfbd488bb55bcaa378a75c31d4107c6d405cb46fc1404e92ad354a3c4ac9920
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 1f441da985039c5918d39dc45be0f524847c5dd337f1ea890b0aee492596b37d
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.ppc64le.rpm SHA-256: c95fe5ac3f2c01b8dafcff90f94ca0b66e56d29c6f97339180beafe72b681260
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: 04ed1b7dea84ea845189b81ec0ec7dfad5d0e79a3cb4f973f4328218b9a2bafe
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: 9ebb25bc2eaf8a30b35c8a2d7031b67757afbcc18355052cafefcda970532f3a

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-348-1-3.el8.src.rpm SHA-256: 6a458f70ec04d5344b79a17d65015d1516dfe97b3b5375b186f9d819da344994
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.src.rpm SHA-256: 07a370cc6e81243963a2f993ebaf28e2982632325884ecd01aef1699fe2c64d2
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.src.rpm SHA-256: 965e45e117393c9430451bde14af0548360949941249cd1e96e7143251f85171
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.src.rpm SHA-256: 190c1123db3add64496e9ec6f330a1432f63940d6e2da5561a037ea46a237903
x86_64
kpatch-patch-4_18_0-348-1-3.el8.x86_64.rpm SHA-256: 286692c900f70984d069c0d45b9d8b01bc9a632a76f75377636190f9ba04c536
kpatch-patch-4_18_0-348-debuginfo-1-3.el8.x86_64.rpm SHA-256: d6e2f664bbe447a8b8de54d5981e1fe576c4f54379a4d7908f14c8f8b7afdfeb
kpatch-patch-4_18_0-348-debugsource-1-3.el8.x86_64.rpm SHA-256: 4c6b701cfb1304cca9e5482722a110db9cd92eaa78af6b90f854829a7a4615da
kpatch-patch-4_18_0-348_12_2-1-1.el8_5.x86_64.rpm SHA-256: d82c46a0c3211a7e13338e54d5cfd35b416e8f41b0ed44792825e79fe5aa662b
kpatch-patch-4_18_0-348_12_2-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 70f09b1410e3d559abc4bcc0e089dc2211d2f03d148fc3787c85265425d31173
kpatch-patch-4_18_0-348_12_2-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 45b1eafae020b0faca50260a5a5ffdd672ea1ba50457f86e0ff2a6c466a9eb75
kpatch-patch-4_18_0-348_2_1-1-2.el8_5.x86_64.rpm SHA-256: 80158b5917c0150952ac908cbd9b5c02f80c9cda5ec20359eb81b73c2d174f16
kpatch-patch-4_18_0-348_2_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 499b7317de69109ac6c6273d266837f464d1a23d64d470412f8d72edecc671ed
kpatch-patch-4_18_0-348_2_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: 573e6f0e486781fb9e5397cbffdced4273dff4a1001123267fac2e53cbc83eae
kpatch-patch-4_18_0-348_7_1-1-2.el8_5.x86_64.rpm SHA-256: 606c9bb847cde493957a50af74acb2fa49319b3da6e0c94bdb4ba0455e6e02e4
kpatch-patch-4_18_0-348_7_1-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 3629508fc008500497cb915a26e43f40b5460066c6eef7671c5decd81dd056bb
kpatch-patch-4_18_0-348_7_1-debugsource-1-2.el8_5.x86_64.rpm SHA-256: c29e61b42f4ad8a49ed670884b844f73004624048a908692f784b6c328dfb466

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility