Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:5839 - Security Advisory
Issued:
2022-08-02
Updated:
2022-08-02

RHSA-2022:5839 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVEs

  • CVE-2022-32250

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
ppc64le
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.ppc64le.rpm SHA-256: 59deb3ecb12d53a0160ec18ec2919bcceb14f60d34eb061ded031c3d773f6c05
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 0da665e0d99e4b921ddd1dc41c04025ebba0da871723214cb04f19d11b81dc1c
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: a01fee0f2820079b9ae7e0f11417bdb3e5986206f3fce6be648a2736440189d9
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.ppc64le.rpm SHA-256: abe99297a33cb028640d58f332edf26cedf133f1093e35b8f67d0f97f88320b8
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 65fba469fa2eae84b76489344defbd0c011709fb51c589badd1faa59ac5bfdd0
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 533f5982f71292982080e52be1e2725b04042ddcab8f43655ab89793cf4300c2
kpatch-patch-4_18_0-372_9_1-1-2.el8.ppc64le.rpm SHA-256: 58440de9c25274b2338f6cc8fc56c295aa260cb17c6d3c895643d7a142bf38cc
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.ppc64le.rpm SHA-256: e4e618cc90a422bbb5bd29f3f05caad25dd3bf6e9fb6f412a0ac9860fc220b47
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.ppc64le.rpm SHA-256: 5c3b6c4d86df7b2dd20e91869f323e749b64d08eb5cbfab0ec88fd1e6c28a075

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
ppc64le
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.ppc64le.rpm SHA-256: 59deb3ecb12d53a0160ec18ec2919bcceb14f60d34eb061ded031c3d773f6c05
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 0da665e0d99e4b921ddd1dc41c04025ebba0da871723214cb04f19d11b81dc1c
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: a01fee0f2820079b9ae7e0f11417bdb3e5986206f3fce6be648a2736440189d9
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.ppc64le.rpm SHA-256: abe99297a33cb028640d58f332edf26cedf133f1093e35b8f67d0f97f88320b8
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 65fba469fa2eae84b76489344defbd0c011709fb51c589badd1faa59ac5bfdd0
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 533f5982f71292982080e52be1e2725b04042ddcab8f43655ab89793cf4300c2
kpatch-patch-4_18_0-372_9_1-1-2.el8.ppc64le.rpm SHA-256: 58440de9c25274b2338f6cc8fc56c295aa260cb17c6d3c895643d7a142bf38cc
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.ppc64le.rpm SHA-256: e4e618cc90a422bbb5bd29f3f05caad25dd3bf6e9fb6f412a0ac9860fc220b47
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.ppc64le.rpm SHA-256: 5c3b6c4d86df7b2dd20e91869f323e749b64d08eb5cbfab0ec88fd1e6c28a075

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
ppc64le
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.ppc64le.rpm SHA-256: 59deb3ecb12d53a0160ec18ec2919bcceb14f60d34eb061ded031c3d773f6c05
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 0da665e0d99e4b921ddd1dc41c04025ebba0da871723214cb04f19d11b81dc1c
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: a01fee0f2820079b9ae7e0f11417bdb3e5986206f3fce6be648a2736440189d9
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.ppc64le.rpm SHA-256: abe99297a33cb028640d58f332edf26cedf133f1093e35b8f67d0f97f88320b8
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 65fba469fa2eae84b76489344defbd0c011709fb51c589badd1faa59ac5bfdd0
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 533f5982f71292982080e52be1e2725b04042ddcab8f43655ab89793cf4300c2
kpatch-patch-4_18_0-372_9_1-1-2.el8.ppc64le.rpm SHA-256: 58440de9c25274b2338f6cc8fc56c295aa260cb17c6d3c895643d7a142bf38cc
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.ppc64le.rpm SHA-256: e4e618cc90a422bbb5bd29f3f05caad25dd3bf6e9fb6f412a0ac9860fc220b47
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.ppc64le.rpm SHA-256: 5c3b6c4d86df7b2dd20e91869f323e749b64d08eb5cbfab0ec88fd1e6c28a075

Red Hat Enterprise Linux Server - TUS 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
ppc64le
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.ppc64le.rpm SHA-256: 59deb3ecb12d53a0160ec18ec2919bcceb14f60d34eb061ded031c3d773f6c05
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 0da665e0d99e4b921ddd1dc41c04025ebba0da871723214cb04f19d11b81dc1c
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: a01fee0f2820079b9ae7e0f11417bdb3e5986206f3fce6be648a2736440189d9
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.ppc64le.rpm SHA-256: abe99297a33cb028640d58f332edf26cedf133f1093e35b8f67d0f97f88320b8
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 65fba469fa2eae84b76489344defbd0c011709fb51c589badd1faa59ac5bfdd0
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 533f5982f71292982080e52be1e2725b04042ddcab8f43655ab89793cf4300c2
kpatch-patch-4_18_0-372_9_1-1-2.el8.ppc64le.rpm SHA-256: 58440de9c25274b2338f6cc8fc56c295aa260cb17c6d3c895643d7a142bf38cc
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.ppc64le.rpm SHA-256: e4e618cc90a422bbb5bd29f3f05caad25dd3bf6e9fb6f412a0ac9860fc220b47
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.ppc64le.rpm SHA-256: 5c3b6c4d86df7b2dd20e91869f323e749b64d08eb5cbfab0ec88fd1e6c28a075

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
ppc64le
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.ppc64le.rpm SHA-256: 59deb3ecb12d53a0160ec18ec2919bcceb14f60d34eb061ded031c3d773f6c05
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 0da665e0d99e4b921ddd1dc41c04025ebba0da871723214cb04f19d11b81dc1c
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: a01fee0f2820079b9ae7e0f11417bdb3e5986206f3fce6be648a2736440189d9
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.ppc64le.rpm SHA-256: abe99297a33cb028640d58f332edf26cedf133f1093e35b8f67d0f97f88320b8
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: 65fba469fa2eae84b76489344defbd0c011709fb51c589badd1faa59ac5bfdd0
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: 533f5982f71292982080e52be1e2725b04042ddcab8f43655ab89793cf4300c2
kpatch-patch-4_18_0-372_9_1-1-2.el8.ppc64le.rpm SHA-256: 58440de9c25274b2338f6cc8fc56c295aa260cb17c6d3c895643d7a142bf38cc
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.ppc64le.rpm SHA-256: e4e618cc90a422bbb5bd29f3f05caad25dd3bf6e9fb6f412a0ac9860fc220b47
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.ppc64le.rpm SHA-256: 5c3b6c4d86df7b2dd20e91869f323e749b64d08eb5cbfab0ec88fd1e6c28a075

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.src.rpm SHA-256: 3310e4ec0f90e548f0172040849ff411d9c92401be4af489721a2fc5c1bf5bca
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.src.rpm SHA-256: 9861f0e73bac022bf3358779fc418cde20a3690a76f0ffae89367a59be144d8c
kpatch-patch-4_18_0-372_9_1-1-2.el8.src.rpm SHA-256: 77c12ed89faace6731024b76e2b628b728e424f5bdbda847179a5e860af5d31f
x86_64
kpatch-patch-4_18_0-372_13_1-1-1.el8_6.x86_64.rpm SHA-256: f0b09cd70be1403ea516864357b61979c1eb596734e35913af1c1d39f99ffb58
kpatch-patch-4_18_0-372_13_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 68ad6826590a75c43cda9d07edc528bb8dcf7ca0f5badec5607217582505d5ed
kpatch-patch-4_18_0-372_13_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 169900d7c439630685a7b3b036dafdabc99ce74aff43a44af2b4f06c5077f66f
kpatch-patch-4_18_0-372_16_1-1-1.el8_6.x86_64.rpm SHA-256: 826889aa79b6ce5d95ccce28f18a72b8cbfd5af0375c0254489f98794330d186
kpatch-patch-4_18_0-372_16_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: 2772c9660bf174a5b28215d8b40829b0a7db03d15539b96ab12a4d059a966f10
kpatch-patch-4_18_0-372_16_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 0aad7dba7140492916923b9afde66e2eebfe367066f0dc742a7acfd66d9645c6
kpatch-patch-4_18_0-372_9_1-1-2.el8.x86_64.rpm SHA-256: 12e52b79709caf501398655c9639d59f708f15fa51e4740b893107f81b7012f2
kpatch-patch-4_18_0-372_9_1-debuginfo-1-2.el8.x86_64.rpm SHA-256: fb9d7c8b6d333c422fcf024c34936bae520029c0db7cf52c6dd4cfcfd3981b7e
kpatch-patch-4_18_0-372_9_1-debugsource-1-2.el8.x86_64.rpm SHA-256: f22fc933a302eda13723680457e60d69625e77779bcf8bfb2c02652478c0c9bb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility