Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2022:6978 - Security Advisory
Issued:
2022-10-18
Updated:
2022-10-18

RHSA-2022:6978 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation

CVEs

  • CVE-2022-2588

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
ppc64le
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.ppc64le.rpm SHA-256: f4ca789bf15468619164e33d3c36ac4bfe1d585a9c9c07bea6fa6f97c04fdcf1
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.ppc64le.rpm SHA-256: 7d33ca1e01b382474cdeb67e4efa81599f0ff703375ad1c3370a5338f251c2e5
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.ppc64le.rpm SHA-256: a750c382507940cd4bd88b54f1044d03a404502c121a4a628ba7e7362fc56125
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.ppc64le.rpm SHA-256: 9cc370c4867c40d968f98ec657fa46168c8d4121690f8dcac1ee3e2bf5c29f83
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 88cbf599a85d196944ff42bcb52d3f87f9cbf4ed06ba7d9e95e9db036b2a075c
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 3105182441b19da7bfcc019061319a93ed5ef6bbcef4107ce273c014e8766fb1
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.ppc64le.rpm SHA-256: d117d1cc41cf257a5278ab0a2add60c3cad842b88cb3e5bbebfecfd1e24a4696
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 9d9b16fd833052eab9076f89e47fb5a448324ac1242709d464fd9868ad734ffa
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 28e128b6eb1922c287cd49fb191501a661402a45e0c6c3230cb43ca5eaf14f03
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.ppc64le.rpm SHA-256: 439af8232cae28b8abbfd06e03726f7aa9368345123433bf2ad02d3f6a9f63ae
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: fa55d6c3af9eff5b92c82cb9724996d72d43dcea53ef215d389b579614edfd27
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: cc969165de301cd27f6bb1c024df1fe71aa1636ce2faebe2a0a0695d915372b9
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.ppc64le.rpm SHA-256: c82c0e64aca335ef735ea61aa69c24f017bef380c61d96bb5a943b4987c6821a
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 2c2c54fedd7babcb840bc97b8f3efd55f71e27160be9c03969a0c69718fef9c5
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: c51615c049eadfde6d0be5ac8a9c76e6c03caa89c5fec54e40c4645a64972d52

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
ppc64le
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.ppc64le.rpm SHA-256: f4ca789bf15468619164e33d3c36ac4bfe1d585a9c9c07bea6fa6f97c04fdcf1
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.ppc64le.rpm SHA-256: 7d33ca1e01b382474cdeb67e4efa81599f0ff703375ad1c3370a5338f251c2e5
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.ppc64le.rpm SHA-256: a750c382507940cd4bd88b54f1044d03a404502c121a4a628ba7e7362fc56125
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.ppc64le.rpm SHA-256: 9cc370c4867c40d968f98ec657fa46168c8d4121690f8dcac1ee3e2bf5c29f83
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.ppc64le.rpm SHA-256: 88cbf599a85d196944ff42bcb52d3f87f9cbf4ed06ba7d9e95e9db036b2a075c
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.ppc64le.rpm SHA-256: 3105182441b19da7bfcc019061319a93ed5ef6bbcef4107ce273c014e8766fb1
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.ppc64le.rpm SHA-256: d117d1cc41cf257a5278ab0a2add60c3cad842b88cb3e5bbebfecfd1e24a4696
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.ppc64le.rpm SHA-256: 9d9b16fd833052eab9076f89e47fb5a448324ac1242709d464fd9868ad734ffa
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.ppc64le.rpm SHA-256: 28e128b6eb1922c287cd49fb191501a661402a45e0c6c3230cb43ca5eaf14f03
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.ppc64le.rpm SHA-256: 439af8232cae28b8abbfd06e03726f7aa9368345123433bf2ad02d3f6a9f63ae
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: fa55d6c3af9eff5b92c82cb9724996d72d43dcea53ef215d389b579614edfd27
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: cc969165de301cd27f6bb1c024df1fe71aa1636ce2faebe2a0a0695d915372b9
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.ppc64le.rpm SHA-256: c82c0e64aca335ef735ea61aa69c24f017bef380c61d96bb5a943b4987c6821a
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.ppc64le.rpm SHA-256: 2c2c54fedd7babcb840bc97b8f3efd55f71e27160be9c03969a0c69718fef9c5
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.ppc64le.rpm SHA-256: c51615c049eadfde6d0be5ac8a9c76e6c03caa89c5fec54e40c4645a64972d52

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.src.rpm SHA-256: eafabef3c77b1d9a9fcf3e25e9cf8103fea13369c29f571ea587f24151ee50dd
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.src.rpm SHA-256: 3436efb34421cfb20fd0708e118e82f3419ef03ec9d7e02dbd13b3616cd49430
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.src.rpm SHA-256: 74d2dc32cde2a36ab3b6a8d8b61389f7b58b292977f7ffb30f66d3a7fc86fb7e
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.src.rpm SHA-256: af80933ff067d417feade88f961296018e0b240f7c904fa0a8d1d7dffb50bb03
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.src.rpm SHA-256: 747fe3a52ade764707f8494bfcd44bb4d37bd20ed33395a66961c46f2c6d0ad9
x86_64
kpatch-patch-4_18_0-305_25_1-1-9.el8_4.x86_64.rpm SHA-256: 8a4bd1976486d941665cfef66199969683171dac04441b592c845bab28ea42f8
kpatch-patch-4_18_0-305_25_1-debuginfo-1-9.el8_4.x86_64.rpm SHA-256: d0b8f33fce028678f57db880ad59dcddfe82c85336a629891d77a2d3d72a4abe
kpatch-patch-4_18_0-305_25_1-debugsource-1-9.el8_4.x86_64.rpm SHA-256: 88cde8e529ad37e95d5329daf09e05d3c5646db3dd3c89a94daccd8d3b3f8057
kpatch-patch-4_18_0-305_45_1-1-3.el8_4.x86_64.rpm SHA-256: b658c31c578052f313c7123d84d574815ee987e6d58fdbd01b098d1ff535e5eb
kpatch-patch-4_18_0-305_45_1-debuginfo-1-3.el8_4.x86_64.rpm SHA-256: 3de8e46c2dc47e7d867fffd18a991158a7426d48e79f4f07625958e87dad5109
kpatch-patch-4_18_0-305_45_1-debugsource-1-3.el8_4.x86_64.rpm SHA-256: bf4fbdc500201400edef9ad093c1adad0364539968461273328e4d89172c1c1e
kpatch-patch-4_18_0-305_49_1-1-2.el8_4.x86_64.rpm SHA-256: 0b4bba29ed719d4ae6334734f1cddd6bfbef8a8eb7088831c518b1ddfdca6591
kpatch-patch-4_18_0-305_49_1-debuginfo-1-2.el8_4.x86_64.rpm SHA-256: 82a45ef28cc575a58695c7ab6a721ed944c9c51a5b9b37f2b1fc33dab1b91e1b
kpatch-patch-4_18_0-305_49_1-debugsource-1-2.el8_4.x86_64.rpm SHA-256: 28cba60d8d42bc75efc3950818c10d8ab27040dad3ab2bdd4691997f2118db5f
kpatch-patch-4_18_0-305_57_1-1-1.el8_4.x86_64.rpm SHA-256: 4c7e579a0cef9db8b5d89935532da78ec9b003766dc691ada59a7906801eb8ca
kpatch-patch-4_18_0-305_57_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: 124ab26f441f31a15ef11fa3effd8fee4f182365b34abce3bd34911d17284743
kpatch-patch-4_18_0-305_57_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: d694255be1db067b9b1a18748fa1a33c3f1469a370f575a29c2627c9d7386ae3
kpatch-patch-4_18_0-305_62_1-1-1.el8_4.x86_64.rpm SHA-256: 45f2a5f10525225d45d5693a9307ddf55d5a1fda53eea0afcde6a117ebb63d1d
kpatch-patch-4_18_0-305_62_1-debuginfo-1-1.el8_4.x86_64.rpm SHA-256: abca73f32122336d925f4e76b5babb3eb85752a6a248f79deccc18819a62bda2
kpatch-patch-4_18_0-305_62_1-debugsource-1-1.el8_4.x86_64.rpm SHA-256: e875e7898923f36d6f318d481e37b51049c1993b088696f49c42ee765b82ee11

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter