Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:1660 - Security Advisory
Issued:
2023-04-05
Updated:
2023-04-05

RHSA-2023:1660 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kpatch-patch security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Security Fix(es):

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
  • kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2159505 - CVE-2023-0386 kernel: FUSE filesystem low-privileged user privileges escalation
  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF

CVEs

  • CVE-2023-0266
  • CVE-2023-0386

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
x86_64
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.x86_64.rpm SHA-256: 4e53c1c3bc546734e0a84de3b9121ef66d18d9b187fb828162a6834625fa18d1
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: c15e98e68210c2433ebc9412892da052aa185b393d732b8af36d7401c384f113
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: d833050e79d8348a96a2fb692c7b77c407edf1f6135c1dd7144b64626ead98c9
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.x86_64.rpm SHA-256: 894981d1bbd372afb4ac7a9750ddf7a5cb3933f15bbbd21a387606a5161c4100
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 860e69535c6e2f44fb2130e5b7e667953376ae25038506621f04c8e353aa40d8
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: dbb35f54982ebb0bc88e95747a66d62cfe25721e374b9dd5b4e060ad09948f3c
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.x86_64.rpm SHA-256: 47500c173ed2145eef832bb1250921afeb46a45307b3faa1bb4c7cdf6ac62273
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fcdda332fc3ed920b16dcb992465f160ad231f14e1dbf07c08f0b582896e82fa
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: e4658cd658c13ca49d877451aec0b8df85711cd8e56a0eedda3ed992d36d6b90
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.x86_64.rpm SHA-256: eba46d9644df50e4b5995cf279bc7c17376d6c4a55ee22a4478fcf1d7bb0a9f5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 52b0b58fb29ed910d5e807f113f8f9d65197d1cc41565e556edb00da17edc8a7
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 24dc315d414353d582238fbf91ab3ba5a67c5530d728574dd1056aac1b7d3831
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.x86_64.rpm SHA-256: 7bbb6b466c55b14af2eda5b76c193bde574f439e22ba443077e8cef893456127
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: e54e743fe5daccc7fe402f1a3e22915ea098849a83bec6927fb2223f7c424c6a
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 740541875f57c25f7ad1aa227d914fcc9cc6bdb8f6e200a926ab8e7c36c2224b
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.x86_64.rpm SHA-256: 90fc37933ab4d8b00fcddb380540ac32aca17b1de663222bd85caa13e0d56b8b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: d0cbb5d12961e16b8776569edae53571622604f36d3f6ba9ba1f06ccb6309d55
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 8453bc721a25d7b5321452f16293ee45b9dac25a039455adde27511b90a7ca5c

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
x86_64
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.x86_64.rpm SHA-256: 4e53c1c3bc546734e0a84de3b9121ef66d18d9b187fb828162a6834625fa18d1
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: c15e98e68210c2433ebc9412892da052aa185b393d732b8af36d7401c384f113
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: d833050e79d8348a96a2fb692c7b77c407edf1f6135c1dd7144b64626ead98c9
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.x86_64.rpm SHA-256: 894981d1bbd372afb4ac7a9750ddf7a5cb3933f15bbbd21a387606a5161c4100
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 860e69535c6e2f44fb2130e5b7e667953376ae25038506621f04c8e353aa40d8
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: dbb35f54982ebb0bc88e95747a66d62cfe25721e374b9dd5b4e060ad09948f3c
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.x86_64.rpm SHA-256: 47500c173ed2145eef832bb1250921afeb46a45307b3faa1bb4c7cdf6ac62273
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fcdda332fc3ed920b16dcb992465f160ad231f14e1dbf07c08f0b582896e82fa
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: e4658cd658c13ca49d877451aec0b8df85711cd8e56a0eedda3ed992d36d6b90
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.x86_64.rpm SHA-256: eba46d9644df50e4b5995cf279bc7c17376d6c4a55ee22a4478fcf1d7bb0a9f5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 52b0b58fb29ed910d5e807f113f8f9d65197d1cc41565e556edb00da17edc8a7
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 24dc315d414353d582238fbf91ab3ba5a67c5530d728574dd1056aac1b7d3831
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.x86_64.rpm SHA-256: 7bbb6b466c55b14af2eda5b76c193bde574f439e22ba443077e8cef893456127
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: e54e743fe5daccc7fe402f1a3e22915ea098849a83bec6927fb2223f7c424c6a
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 740541875f57c25f7ad1aa227d914fcc9cc6bdb8f6e200a926ab8e7c36c2224b
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.x86_64.rpm SHA-256: 90fc37933ab4d8b00fcddb380540ac32aca17b1de663222bd85caa13e0d56b8b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: d0cbb5d12961e16b8776569edae53571622604f36d3f6ba9ba1f06ccb6309d55
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 8453bc721a25d7b5321452f16293ee45b9dac25a039455adde27511b90a7ca5c

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
x86_64
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.x86_64.rpm SHA-256: 4e53c1c3bc546734e0a84de3b9121ef66d18d9b187fb828162a6834625fa18d1
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: c15e98e68210c2433ebc9412892da052aa185b393d732b8af36d7401c384f113
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: d833050e79d8348a96a2fb692c7b77c407edf1f6135c1dd7144b64626ead98c9
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.x86_64.rpm SHA-256: 894981d1bbd372afb4ac7a9750ddf7a5cb3933f15bbbd21a387606a5161c4100
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 860e69535c6e2f44fb2130e5b7e667953376ae25038506621f04c8e353aa40d8
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: dbb35f54982ebb0bc88e95747a66d62cfe25721e374b9dd5b4e060ad09948f3c
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.x86_64.rpm SHA-256: 47500c173ed2145eef832bb1250921afeb46a45307b3faa1bb4c7cdf6ac62273
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fcdda332fc3ed920b16dcb992465f160ad231f14e1dbf07c08f0b582896e82fa
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: e4658cd658c13ca49d877451aec0b8df85711cd8e56a0eedda3ed992d36d6b90
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.x86_64.rpm SHA-256: eba46d9644df50e4b5995cf279bc7c17376d6c4a55ee22a4478fcf1d7bb0a9f5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 52b0b58fb29ed910d5e807f113f8f9d65197d1cc41565e556edb00da17edc8a7
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 24dc315d414353d582238fbf91ab3ba5a67c5530d728574dd1056aac1b7d3831
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.x86_64.rpm SHA-256: 7bbb6b466c55b14af2eda5b76c193bde574f439e22ba443077e8cef893456127
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: e54e743fe5daccc7fe402f1a3e22915ea098849a83bec6927fb2223f7c424c6a
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 740541875f57c25f7ad1aa227d914fcc9cc6bdb8f6e200a926ab8e7c36c2224b
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.x86_64.rpm SHA-256: 90fc37933ab4d8b00fcddb380540ac32aca17b1de663222bd85caa13e0d56b8b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: d0cbb5d12961e16b8776569edae53571622604f36d3f6ba9ba1f06ccb6309d55
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 8453bc721a25d7b5321452f16293ee45b9dac25a039455adde27511b90a7ca5c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
ppc64le
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.ppc64le.rpm SHA-256: 5b4edc718f39e43fe5d4a1a2fe9b68bdfa9ee2b6311f3271b5b45af85f064560
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.ppc64le.rpm SHA-256: 9827e149e0de041c8ff84c6d6eed058868f5082c825fc9a37a220098d6f344e0
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.ppc64le.rpm SHA-256: d5e8f8a4508a1cbfce56554bbc3fe63d7e8dd52b885948a3ecb474b4c56af65f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.ppc64le.rpm SHA-256: e99a07468d7bb4c7a5f44f88012c337dc9763d3ca2cc4157451068fc47682bef
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.ppc64le.rpm SHA-256: 337449468a024359d75ebcda6b2aef457fa28ab683739fb06f501e9722519439
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.ppc64le.rpm SHA-256: 383d349abbb326b201bd41e1965a0e50466e42efb26d6a2405dc74268ba1cf07
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.ppc64le.rpm SHA-256: 7329e8c554d34896cc5696ec307a1ead5b4d301e57ac7d4995903be27687b159
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: c62aa67954aa1736a5a50db897acc0f9b4997a1855b88d70bb7fd017a9e86d60
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: e8909e5bd6768050f86f2432efdde667c0e4ceb4df57c3a104c13918f7b684a8
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.ppc64le.rpm SHA-256: 239bbcc31cdbe2ccf2b59420a2f30f69df13352c5fa589a1650fe661c1c46f5b
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: 63f4bc5b9a8d4cba4e8e592ac361fe0122f058b1f11212d06dd982165430722f
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: dd2b7a6c989568b7b22021997843247a1e7b516f4c7276e71228c099f16d4958
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.ppc64le.rpm SHA-256: afc68295390df84a6c302166fed99da45f1be762dabd060636707089f457bd06
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.ppc64le.rpm SHA-256: 7b52d43a7f429c6ea98081ac599b1dc3524663898fedb37585aa08574fff4f15
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.ppc64le.rpm SHA-256: 93aa7fbab08d5303b22b7c2e6f699c38abf87ac257102c4b40ebfa3f30d29342
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.ppc64le.rpm SHA-256: e13235347b21bdd24c733f617570c5f9950823c41d020a96481b8eafc541e4a4
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: a25baa6f3a2f1fb5cdc4399fba386fe49003714e98f3a15d76406e7acaa85eda
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: cac4ca5f1dfe4c98acc21d975cd302c7937cd7228407db98316b43d8b165d5e1

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
x86_64
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.x86_64.rpm SHA-256: 4e53c1c3bc546734e0a84de3b9121ef66d18d9b187fb828162a6834625fa18d1
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: c15e98e68210c2433ebc9412892da052aa185b393d732b8af36d7401c384f113
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: d833050e79d8348a96a2fb692c7b77c407edf1f6135c1dd7144b64626ead98c9
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.x86_64.rpm SHA-256: 894981d1bbd372afb4ac7a9750ddf7a5cb3933f15bbbd21a387606a5161c4100
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 860e69535c6e2f44fb2130e5b7e667953376ae25038506621f04c8e353aa40d8
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: dbb35f54982ebb0bc88e95747a66d62cfe25721e374b9dd5b4e060ad09948f3c
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.x86_64.rpm SHA-256: 47500c173ed2145eef832bb1250921afeb46a45307b3faa1bb4c7cdf6ac62273
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fcdda332fc3ed920b16dcb992465f160ad231f14e1dbf07c08f0b582896e82fa
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: e4658cd658c13ca49d877451aec0b8df85711cd8e56a0eedda3ed992d36d6b90
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.x86_64.rpm SHA-256: eba46d9644df50e4b5995cf279bc7c17376d6c4a55ee22a4478fcf1d7bb0a9f5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 52b0b58fb29ed910d5e807f113f8f9d65197d1cc41565e556edb00da17edc8a7
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 24dc315d414353d582238fbf91ab3ba5a67c5530d728574dd1056aac1b7d3831
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.x86_64.rpm SHA-256: 7bbb6b466c55b14af2eda5b76c193bde574f439e22ba443077e8cef893456127
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: e54e743fe5daccc7fe402f1a3e22915ea098849a83bec6927fb2223f7c424c6a
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 740541875f57c25f7ad1aa227d914fcc9cc6bdb8f6e200a926ab8e7c36c2224b
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.x86_64.rpm SHA-256: 90fc37933ab4d8b00fcddb380540ac32aca17b1de663222bd85caa13e0d56b8b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: d0cbb5d12961e16b8776569edae53571622604f36d3f6ba9ba1f06ccb6309d55
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 8453bc721a25d7b5321452f16293ee45b9dac25a039455adde27511b90a7ca5c

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
ppc64le
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.ppc64le.rpm SHA-256: 5b4edc718f39e43fe5d4a1a2fe9b68bdfa9ee2b6311f3271b5b45af85f064560
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.ppc64le.rpm SHA-256: 9827e149e0de041c8ff84c6d6eed058868f5082c825fc9a37a220098d6f344e0
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.ppc64le.rpm SHA-256: d5e8f8a4508a1cbfce56554bbc3fe63d7e8dd52b885948a3ecb474b4c56af65f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.ppc64le.rpm SHA-256: e99a07468d7bb4c7a5f44f88012c337dc9763d3ca2cc4157451068fc47682bef
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.ppc64le.rpm SHA-256: 337449468a024359d75ebcda6b2aef457fa28ab683739fb06f501e9722519439
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.ppc64le.rpm SHA-256: 383d349abbb326b201bd41e1965a0e50466e42efb26d6a2405dc74268ba1cf07
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.ppc64le.rpm SHA-256: 7329e8c554d34896cc5696ec307a1ead5b4d301e57ac7d4995903be27687b159
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: c62aa67954aa1736a5a50db897acc0f9b4997a1855b88d70bb7fd017a9e86d60
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: e8909e5bd6768050f86f2432efdde667c0e4ceb4df57c3a104c13918f7b684a8
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.ppc64le.rpm SHA-256: 239bbcc31cdbe2ccf2b59420a2f30f69df13352c5fa589a1650fe661c1c46f5b
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.ppc64le.rpm SHA-256: 63f4bc5b9a8d4cba4e8e592ac361fe0122f058b1f11212d06dd982165430722f
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.ppc64le.rpm SHA-256: dd2b7a6c989568b7b22021997843247a1e7b516f4c7276e71228c099f16d4958
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.ppc64le.rpm SHA-256: afc68295390df84a6c302166fed99da45f1be762dabd060636707089f457bd06
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.ppc64le.rpm SHA-256: 7b52d43a7f429c6ea98081ac599b1dc3524663898fedb37585aa08574fff4f15
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.ppc64le.rpm SHA-256: 93aa7fbab08d5303b22b7c2e6f699c38abf87ac257102c4b40ebfa3f30d29342
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.ppc64le.rpm SHA-256: e13235347b21bdd24c733f617570c5f9950823c41d020a96481b8eafc541e4a4
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.ppc64le.rpm SHA-256: a25baa6f3a2f1fb5cdc4399fba386fe49003714e98f3a15d76406e7acaa85eda
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.ppc64le.rpm SHA-256: cac4ca5f1dfe4c98acc21d975cd302c7937cd7228407db98316b43d8b165d5e1

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.src.rpm SHA-256: 7ed17f78978b8066c902acdcb7f62a6a35932392a9cc600497bef966d565e33f
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.src.rpm SHA-256: 094e368c4ad2e4254e31e72139bae496a2faedcc0a9969355bee63a65dda1db4
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.src.rpm SHA-256: ef5371787feca0a64f5ca8698812dd4a5ca8d3c9da581575e41971fdeac1b527
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.src.rpm SHA-256: 593f24b14ad06204cd8051a31223ffb92897d1a73cb22396ef121cf568c06510
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.src.rpm SHA-256: 8161bb3bf32af0768ba089ff39e5257f26082dbbd8277b4b4d0f56694d8e175e
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.src.rpm SHA-256: e768d07c244ffe26895c6dac99be730613eb8c6591ca00f6961f5b1c68e36da6
x86_64
kpatch-patch-4_18_0-372_26_1-1-6.el8_6.x86_64.rpm SHA-256: 4e53c1c3bc546734e0a84de3b9121ef66d18d9b187fb828162a6834625fa18d1
kpatch-patch-4_18_0-372_26_1-debuginfo-1-6.el8_6.x86_64.rpm SHA-256: c15e98e68210c2433ebc9412892da052aa185b393d732b8af36d7401c384f113
kpatch-patch-4_18_0-372_26_1-debugsource-1-6.el8_6.x86_64.rpm SHA-256: d833050e79d8348a96a2fb692c7b77c407edf1f6135c1dd7144b64626ead98c9
kpatch-patch-4_18_0-372_32_1-1-5.el8_6.x86_64.rpm SHA-256: 894981d1bbd372afb4ac7a9750ddf7a5cb3933f15bbbd21a387606a5161c4100
kpatch-patch-4_18_0-372_32_1-debuginfo-1-5.el8_6.x86_64.rpm SHA-256: 860e69535c6e2f44fb2130e5b7e667953376ae25038506621f04c8e353aa40d8
kpatch-patch-4_18_0-372_32_1-debugsource-1-5.el8_6.x86_64.rpm SHA-256: dbb35f54982ebb0bc88e95747a66d62cfe25721e374b9dd5b4e060ad09948f3c
kpatch-patch-4_18_0-372_36_1-1-4.el8_6.x86_64.rpm SHA-256: 47500c173ed2145eef832bb1250921afeb46a45307b3faa1bb4c7cdf6ac62273
kpatch-patch-4_18_0-372_36_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: fcdda332fc3ed920b16dcb992465f160ad231f14e1dbf07c08f0b582896e82fa
kpatch-patch-4_18_0-372_36_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: e4658cd658c13ca49d877451aec0b8df85711cd8e56a0eedda3ed992d36d6b90
kpatch-patch-4_18_0-372_40_1-1-4.el8_6.x86_64.rpm SHA-256: eba46d9644df50e4b5995cf279bc7c17376d6c4a55ee22a4478fcf1d7bb0a9f5
kpatch-patch-4_18_0-372_40_1-debuginfo-1-4.el8_6.x86_64.rpm SHA-256: 52b0b58fb29ed910d5e807f113f8f9d65197d1cc41565e556edb00da17edc8a7
kpatch-patch-4_18_0-372_40_1-debugsource-1-4.el8_6.x86_64.rpm SHA-256: 24dc315d414353d582238fbf91ab3ba5a67c5530d728574dd1056aac1b7d3831
kpatch-patch-4_18_0-372_41_1-1-3.el8_6.x86_64.rpm SHA-256: 7bbb6b466c55b14af2eda5b76c193bde574f439e22ba443077e8cef893456127
kpatch-patch-4_18_0-372_41_1-debuginfo-1-3.el8_6.x86_64.rpm SHA-256: e54e743fe5daccc7fe402f1a3e22915ea098849a83bec6927fb2223f7c424c6a
kpatch-patch-4_18_0-372_41_1-debugsource-1-3.el8_6.x86_64.rpm SHA-256: 740541875f57c25f7ad1aa227d914fcc9cc6bdb8f6e200a926ab8e7c36c2224b
kpatch-patch-4_18_0-372_46_1-1-1.el8_6.x86_64.rpm SHA-256: 90fc37933ab4d8b00fcddb380540ac32aca17b1de663222bd85caa13e0d56b8b
kpatch-patch-4_18_0-372_46_1-debuginfo-1-1.el8_6.x86_64.rpm SHA-256: d0cbb5d12961e16b8776569edae53571622604f36d3f6ba9ba1f06ccb6309d55
kpatch-patch-4_18_0-372_46_1-debugsource-1-1.el8_6.x86_64.rpm SHA-256: 8453bc721a25d7b5321452f16293ee45b9dac25a039455adde27511b90a7ca5c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility