Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:6978 - Security Advisory
Issued:
2022-10-18
Updated:
2022-10-18

RHSA-2022:6978 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

CVEs

  • CVE-2022-2588

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
ppc64le
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.ppc64le.rpm SHA-256: f4ca789bf15468619164e33d3c36ac4bfe1d585a9c9c07bea6fa6f97c04fdcf1
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.ppc64le.rpm SHA-256: 7d33ca1e01b382474cdeb67e4efa81599f0ff703375ad1c3370a5338f251c2e5
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.ppc64le.rpm SHA-256: a750c382507940cd4bd88b54f1044d03a404502c121a4a628ba7e7362fc56125
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.ppc64le.rpm SHA-256: 9cc370c4867c40d968f98ec657fa46168c8d4121690f8dcac1ee3e2bf5c29f83
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 88cbf599a85d196944ff42bcb52d3f87f9cbf4ed06ba7d9e95e9db036b2a075c
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 3105182441b19da7bfcc019061319a93ed5ef6bbcef4107ce273c014e8766fb1
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.ppc64le.rpm SHA-256: d117d1cc41cf257a5278ab0a2add60c3cad842b88cb3e5bbebfecfd1e24a4696
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 9d9b16fd833052eab9076f89e47fb5a448324ac1242709d464fd9868ad734ffa
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 28e128b6eb1922c287cd49fb191501a661402a45e0c6c3230cb43ca5eaf14f03
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.ppc64le.rpm SHA-256: 439af8232cae28b8abbfd06e03726f7aa9368345123433bf2ad02d3f6a9f63ae
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: fa55d6c3af9eff5b92c82cb9724996d72d43dcea53ef215d389b579614edfd27
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: cc969165de301cd27f6bb1c024df1fe71aa1636ce2faebe2a0a0695d915372b9
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.ppc64le.rpm SHA-256: c82c0e64aca335ef735ea61aa69c24f017bef380c61d96bb5a943b4987c6821a
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 2c2c54fedd7babcb840bc97b8f3efd55f71e27160be9c03969a0c69718fef9c5
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: c51615c049eadfde6d0be5ac8a9c76e6c03caa89c5fec54e40c4645a64972d52

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
ppc64le
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.ppc64le.rpm SHA-256: f4ca789bf15468619164e33d3c36ac4bfe1d585a9c9c07bea6fa6f97c04fdcf1
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.ppc64le.rpm SHA-256: 7d33ca1e01b382474cdeb67e4efa81599f0ff703375ad1c3370a5338f251c2e5
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.ppc64le.rpm SHA-256: a750c382507940cd4bd88b54f1044d03a404502c121a4a628ba7e7362fc56125
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.ppc64le.rpm SHA-256: 9cc370c4867c40d968f98ec657fa46168c8d4121690f8dcac1ee3e2bf5c29f83
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 88cbf599a85d196944ff42bcb52d3f87f9cbf4ed06ba7d9e95e9db036b2a075c
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 3105182441b19da7bfcc019061319a93ed5ef6bbcef4107ce273c014e8766fb1
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.ppc64le.rpm SHA-256: d117d1cc41cf257a5278ab0a2add60c3cad842b88cb3e5bbebfecfd1e24a4696
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 9d9b16fd833052eab9076f89e47fb5a448324ac1242709d464fd9868ad734ffa
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 28e128b6eb1922c287cd49fb191501a661402a45e0c6c3230cb43ca5eaf14f03
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.ppc64le.rpm SHA-256: 439af8232cae28b8abbfd06e03726f7aa9368345123433bf2ad02d3f6a9f63ae
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: fa55d6c3af9eff5b92c82cb9724996d72d43dcea53ef215d389b579614edfd27
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: cc969165de301cd27f6bb1c024df1fe71aa1636ce2faebe2a0a0695d915372b9
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.ppc64le.rpm SHA-256: c82c0e64aca335ef735ea61aa69c24f017bef380c61d96bb5a943b4987c6821a
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 2c2c54fedd7babcb840bc97b8f3efd55f71e27160be9c03969a0c69718fef9c5
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: c51615c049eadfde6d0be5ac8a9c76e6c03caa89c5fec54e40c4645a64972d52

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility