Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:1535 - Security Advisory
Issued:
2022-04-26
Updated:
2022-04-26

RHSA-2022:1535 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: use-after-free in RDMA listen() (CVE-2021-4028)
  • kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen()
  • BZ - 2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c

CVEs

  • CVE-2021-4028
  • CVE-2022-25636

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
ppc64le
kpatch-patch-4_18_0-348-1-4.el8.ppc64le.rpm SHA-256: 516f20d5c9316ad9d21670ec2a8873d90e41ae9fbe34af34d8136dfd19dbd4d5
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 73634e11e7831661205ca47ac3a0269900da371a70a8da143b783bfc57a2c8b8
kpatch-patch-4_18_0-348-debugsource-1-4.el8.ppc64le.rpm SHA-256: abc32df23ccb4ad3f4df84d9b5f669862f8a25dbba08d2d5dc98cf4f11036717
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.ppc64le.rpm SHA-256: 6a23385cc493b11f9bae5af3c3b34535b8737294e1c4b25a207d3303881352e0
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: d53524c592c7bbc9fccf0748663ca1b8e4043568f2b11bac4f814a4e922c23b4
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: d6e3ba9e96471a2dc37f806209c795e552d743f3cf3802ddde6ccbd46c5a89e9
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.ppc64le.rpm SHA-256: 6dd4063580f0dd6c4f527c4fd8aaa31d879c8f8d4fa3aa80de730cb6af32bd1b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: 1b3aa393a651c8b34d18a200c5553adffa0e5a76c2589dd3a9db5fda04e7edba
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: 5ff76df2fc64dd466f5e48e8d7a6604ca036ee1dd6830b0237169751525f8942
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.ppc64le.rpm SHA-256: d7c5673fb42525a5f8a12bd769f4f7a8995d795bd0a307ae6784fa298da68749
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 72bc074e9534ea2eb96470a1c1e1167270e7b428b402f29c66ce3df85c77365c
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: f6fcc2c6546d66573d2eb97050a4a3c21df6aee8aefa2c26562866d0dcd9c13c
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.ppc64le.rpm SHA-256: e8046bc7d101bd16008af0bd086d8e8ef26874a89f098a1db9cc822275e8d060
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 9605793ddf37409ebaf1cb32422d00b8c7582e6e976d735c3cc50bea1f41ee39
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: 9b8156551d4163591461b0eb5715ec6ae329b74d794a6840f0f841d0efce0a44

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
ppc64le
kpatch-patch-4_18_0-348-1-4.el8.ppc64le.rpm SHA-256: 516f20d5c9316ad9d21670ec2a8873d90e41ae9fbe34af34d8136dfd19dbd4d5
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 73634e11e7831661205ca47ac3a0269900da371a70a8da143b783bfc57a2c8b8
kpatch-patch-4_18_0-348-debugsource-1-4.el8.ppc64le.rpm SHA-256: abc32df23ccb4ad3f4df84d9b5f669862f8a25dbba08d2d5dc98cf4f11036717
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.ppc64le.rpm SHA-256: 6a23385cc493b11f9bae5af3c3b34535b8737294e1c4b25a207d3303881352e0
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: d53524c592c7bbc9fccf0748663ca1b8e4043568f2b11bac4f814a4e922c23b4
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: d6e3ba9e96471a2dc37f806209c795e552d743f3cf3802ddde6ccbd46c5a89e9
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.ppc64le.rpm SHA-256: 6dd4063580f0dd6c4f527c4fd8aaa31d879c8f8d4fa3aa80de730cb6af32bd1b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: 1b3aa393a651c8b34d18a200c5553adffa0e5a76c2589dd3a9db5fda04e7edba
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: 5ff76df2fc64dd466f5e48e8d7a6604ca036ee1dd6830b0237169751525f8942
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.ppc64le.rpm SHA-256: d7c5673fb42525a5f8a12bd769f4f7a8995d795bd0a307ae6784fa298da68749
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 72bc074e9534ea2eb96470a1c1e1167270e7b428b402f29c66ce3df85c77365c
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: f6fcc2c6546d66573d2eb97050a4a3c21df6aee8aefa2c26562866d0dcd9c13c
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.ppc64le.rpm SHA-256: e8046bc7d101bd16008af0bd086d8e8ef26874a89f098a1db9cc822275e8d060
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 9605793ddf37409ebaf1cb32422d00b8c7582e6e976d735c3cc50bea1f41ee39
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: 9b8156551d4163591461b0eb5715ec6ae329b74d794a6840f0f841d0efce0a44

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
ppc64le
kpatch-patch-4_18_0-348-1-4.el8.ppc64le.rpm SHA-256: 516f20d5c9316ad9d21670ec2a8873d90e41ae9fbe34af34d8136dfd19dbd4d5
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 73634e11e7831661205ca47ac3a0269900da371a70a8da143b783bfc57a2c8b8
kpatch-patch-4_18_0-348-debugsource-1-4.el8.ppc64le.rpm SHA-256: abc32df23ccb4ad3f4df84d9b5f669862f8a25dbba08d2d5dc98cf4f11036717
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.ppc64le.rpm SHA-256: 6a23385cc493b11f9bae5af3c3b34535b8737294e1c4b25a207d3303881352e0
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: d53524c592c7bbc9fccf0748663ca1b8e4043568f2b11bac4f814a4e922c23b4
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: d6e3ba9e96471a2dc37f806209c795e552d743f3cf3802ddde6ccbd46c5a89e9
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.ppc64le.rpm SHA-256: 6dd4063580f0dd6c4f527c4fd8aaa31d879c8f8d4fa3aa80de730cb6af32bd1b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: 1b3aa393a651c8b34d18a200c5553adffa0e5a76c2589dd3a9db5fda04e7edba
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: 5ff76df2fc64dd466f5e48e8d7a6604ca036ee1dd6830b0237169751525f8942
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.ppc64le.rpm SHA-256: d7c5673fb42525a5f8a12bd769f4f7a8995d795bd0a307ae6784fa298da68749
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 72bc074e9534ea2eb96470a1c1e1167270e7b428b402f29c66ce3df85c77365c
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: f6fcc2c6546d66573d2eb97050a4a3c21df6aee8aefa2c26562866d0dcd9c13c
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.ppc64le.rpm SHA-256: e8046bc7d101bd16008af0bd086d8e8ef26874a89f098a1db9cc822275e8d060
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 9605793ddf37409ebaf1cb32422d00b8c7582e6e976d735c3cc50bea1f41ee39
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: 9b8156551d4163591461b0eb5715ec6ae329b74d794a6840f0f841d0efce0a44

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
ppc64le
kpatch-patch-4_18_0-348-1-4.el8.ppc64le.rpm SHA-256: 516f20d5c9316ad9d21670ec2a8873d90e41ae9fbe34af34d8136dfd19dbd4d5
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 73634e11e7831661205ca47ac3a0269900da371a70a8da143b783bfc57a2c8b8
kpatch-patch-4_18_0-348-debugsource-1-4.el8.ppc64le.rpm SHA-256: abc32df23ccb4ad3f4df84d9b5f669862f8a25dbba08d2d5dc98cf4f11036717
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.ppc64le.rpm SHA-256: 6a23385cc493b11f9bae5af3c3b34535b8737294e1c4b25a207d3303881352e0
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: d53524c592c7bbc9fccf0748663ca1b8e4043568f2b11bac4f814a4e922c23b4
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: d6e3ba9e96471a2dc37f806209c795e552d743f3cf3802ddde6ccbd46c5a89e9
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.ppc64le.rpm SHA-256: 6dd4063580f0dd6c4f527c4fd8aaa31d879c8f8d4fa3aa80de730cb6af32bd1b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: 1b3aa393a651c8b34d18a200c5553adffa0e5a76c2589dd3a9db5fda04e7edba
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: 5ff76df2fc64dd466f5e48e8d7a6604ca036ee1dd6830b0237169751525f8942
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.ppc64le.rpm SHA-256: d7c5673fb42525a5f8a12bd769f4f7a8995d795bd0a307ae6784fa298da68749
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 72bc074e9534ea2eb96470a1c1e1167270e7b428b402f29c66ce3df85c77365c
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: f6fcc2c6546d66573d2eb97050a4a3c21df6aee8aefa2c26562866d0dcd9c13c
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.ppc64le.rpm SHA-256: e8046bc7d101bd16008af0bd086d8e8ef26874a89f098a1db9cc822275e8d060
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 9605793ddf37409ebaf1cb32422d00b8c7582e6e976d735c3cc50bea1f41ee39
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: 9b8156551d4163591461b0eb5715ec6ae329b74d794a6840f0f841d0efce0a44

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
ppc64le
kpatch-patch-4_18_0-348-1-4.el8.ppc64le.rpm SHA-256: 516f20d5c9316ad9d21670ec2a8873d90e41ae9fbe34af34d8136dfd19dbd4d5
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.ppc64le.rpm SHA-256: 73634e11e7831661205ca47ac3a0269900da371a70a8da143b783bfc57a2c8b8
kpatch-patch-4_18_0-348-debugsource-1-4.el8.ppc64le.rpm SHA-256: abc32df23ccb4ad3f4df84d9b5f669862f8a25dbba08d2d5dc98cf4f11036717
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.ppc64le.rpm SHA-256: 6a23385cc493b11f9bae5af3c3b34535b8737294e1c4b25a207d3303881352e0
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.ppc64le.rpm SHA-256: d53524c592c7bbc9fccf0748663ca1b8e4043568f2b11bac4f814a4e922c23b4
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.ppc64le.rpm SHA-256: d6e3ba9e96471a2dc37f806209c795e552d743f3cf3802ddde6ccbd46c5a89e9
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.ppc64le.rpm SHA-256: 6dd4063580f0dd6c4f527c4fd8aaa31d879c8f8d4fa3aa80de730cb6af32bd1b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.ppc64le.rpm SHA-256: 1b3aa393a651c8b34d18a200c5553adffa0e5a76c2589dd3a9db5fda04e7edba
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.ppc64le.rpm SHA-256: 5ff76df2fc64dd466f5e48e8d7a6604ca036ee1dd6830b0237169751525f8942
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.ppc64le.rpm SHA-256: d7c5673fb42525a5f8a12bd769f4f7a8995d795bd0a307ae6784fa298da68749
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 72bc074e9534ea2eb96470a1c1e1167270e7b428b402f29c66ce3df85c77365c
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: f6fcc2c6546d66573d2eb97050a4a3c21df6aee8aefa2c26562866d0dcd9c13c
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.ppc64le.rpm SHA-256: e8046bc7d101bd16008af0bd086d8e8ef26874a89f098a1db9cc822275e8d060
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.ppc64le.rpm SHA-256: 9605793ddf37409ebaf1cb32422d00b8c7582e6e976d735c3cc50bea1f41ee39
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.ppc64le.rpm SHA-256: 9b8156551d4163591461b0eb5715ec6ae329b74d794a6840f0f841d0efce0a44

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-348-1-4.el8.src.rpm SHA-256: e9b465a5b5dae4a750fecc49eca1adbe97867857c1db552d7592a1b6a4ad037f
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.src.rpm SHA-256: 272627d1ee173812b27615d39605764c46fdc72e220f53eb786cab5d1269814b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.src.rpm SHA-256: e6b7332191e1e8dd1f157bd3e18cc9f4f74879a6c3256119ef93d44ff47916c9
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.src.rpm SHA-256: c240be1765f2362b87528ea4d2cee0690a10344e9c83b0e2dcbc01ab057c94c5
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.src.rpm SHA-256: 05bb0a0e86b052761d57c1bed6ec7caab3e864900fa379294033ee9bfd892046
x86_64
kpatch-patch-4_18_0-348-1-4.el8.x86_64.rpm SHA-256: 9564b6c7e88fc1bd405fa0db914b1da12ffdf697a92b0d7195919766f77ea1b0
kpatch-patch-4_18_0-348-debuginfo-1-4.el8.x86_64.rpm SHA-256: 4ab92c1e6809e2f779552f564e97411d37768e94147cbea9985f8c2838e88752
kpatch-patch-4_18_0-348-debugsource-1-4.el8.x86_64.rpm SHA-256: 4f869a9b1a0f3a28d11790b11be3d237024d6f04df0d6e9fc6eb5ff1de2e6934
kpatch-patch-4_18_0-348_12_2-1-2.el8_5.x86_64.rpm SHA-256: 68d5f66d2fb59a998aa15cfc7bac44732c50fd4453fa4046e057eee67f0c662a
kpatch-patch-4_18_0-348_12_2-debuginfo-1-2.el8_5.x86_64.rpm SHA-256: 8548c9271a321671f4a7762c0db52d6c7960b2017f41067346900a44090e0742
kpatch-patch-4_18_0-348_12_2-debugsource-1-2.el8_5.x86_64.rpm SHA-256: a7ee140e96ecab8fe1b7b7dae78dad4d72eb00bea1c66a07925e953719f4311b
kpatch-patch-4_18_0-348_20_1-1-1.el8_5.x86_64.rpm SHA-256: 355bf349ddc5d4187c5f794b077db74d638e27b6685ceb12e63cd634f6d9242b
kpatch-patch-4_18_0-348_20_1-debuginfo-1-1.el8_5.x86_64.rpm SHA-256: 6da583bded69a380673ea28e0c2d8860bb4d818a9f9b162024a316a668f8fe56
kpatch-patch-4_18_0-348_20_1-debugsource-1-1.el8_5.x86_64.rpm SHA-256: 79cd1e070c696ef479e874bc9c1bdea03776bf7d91e6c75468eea18890ca80d3
kpatch-patch-4_18_0-348_2_1-1-3.el8_5.x86_64.rpm SHA-256: b252c4cdd2eb9b9b68c4520b022175d56f0e03c7fc81af10f7945d68e2c00d17
kpatch-patch-4_18_0-348_2_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: bc5bd549ee7503c76c8b69271cd4b777054555556bf16b162953c9fa06bdcebd
kpatch-patch-4_18_0-348_2_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: 96421fbc29ad58c225df59eca3f04a1653158f7733fead01049f94f061e14825
kpatch-patch-4_18_0-348_7_1-1-3.el8_5.x86_64.rpm SHA-256: e41982784fec569d957acb0ce0245b9c66da2339b9c7b34d8d2780c50e980972
kpatch-patch-4_18_0-348_7_1-debuginfo-1-3.el8_5.x86_64.rpm SHA-256: 6a4ec58a6270550f681e2af05a05939be031809ed3762022baf6c2b280e0eda9
kpatch-patch-4_18_0-348_7_1-debugsource-1-3.el8_5.x86_64.rpm SHA-256: a1ace6ac2661b7c35f937fccadc20a565ce53b014868d2231b85748844aaf2fa

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility