Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090)
- kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
-
Red Hat Enterprise Linux for x86_64 9 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
-
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
-
Red Hat Enterprise Linux Server - AUS 9.4 x86_64
-
Red Hat Enterprise Linux Server - AUS 9.2 x86_64
-
Red Hat Enterprise Linux for Power, little endian 9 ppc64le
-
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
-
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
-
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
-
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
-
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
Fixes
-
BZ - 2215768
- CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
-
BZ - 2218672
- CVE-2023-3090 kernel: ipvlan: out-of-bounds write caused by unclear skb->cb
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 9
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux Server - AUS 9.4
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux Server - AUS 9.2
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux for Power, little endian 9
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
ppc64le |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm
|
SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm
|
SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839 |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm
|
SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm
|
SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm
|
SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm
|
SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
ppc64le |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm
|
SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm
|
SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839 |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm
|
SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm
|
SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm
|
SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm
|
SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
ppc64le |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm
|
SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm
|
SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839 |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm
|
SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm
|
SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm
|
SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm
|
SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
ppc64le |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm
|
SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm
|
SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839 |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm
|
SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm
|
SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm
|
SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm
|
SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
ppc64le |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.ppc64le.rpm
|
SHA-256: 073eb2ea7ec5400152ae281303bc5d95653477f9fd194e4dee97f8591917c3cb |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.ppc64le.rpm
|
SHA-256: ac778fad760b677d65faf947a86f76efd4fcbe70449fa49d53a9dd00d9809839 |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.ppc64le.rpm
|
SHA-256: e675694f3b80e79b2d19d5ac3c987b391b643cf8baa42550f0754472145eb209 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.ppc64le.rpm
|
SHA-256: 2be2fd13dc5b6459f66b3fbab5df8614e783224550d2934dd4685ba2408f4102 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.ppc64le.rpm
|
SHA-256: 67ff5d51a1da267da2c2fcec5ba7620062fb67ccfc6a9229030ea524fe182621 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.ppc64le.rpm
|
SHA-256: f27e6d7ede069012436db165f9d5457d6ed2cd0e78b776e59e5ec0bfc6331905 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2
SRPM |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.src.rpm
|
SHA-256: 469fa989556a0a41ecb716fbbfdddb1824b786196b6d96be72532a5528abc245 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.src.rpm
|
SHA-256: 4de28a6ded95e798cfca3145409c53a0a379925b3fe935867a08a7716d47815b |
x86_64 |
kpatch-patch-5_14_0-284_11_1-1-2.el9_2.x86_64.rpm
|
SHA-256: d863e879173ea04e004b4193cedc20376cf2452f315557564b795a3a99936b88 |
kpatch-patch-5_14_0-284_11_1-debuginfo-1-2.el9_2.x86_64.rpm
|
SHA-256: e10c1965d947e6c6a781571fbc53d675b1d43ebfdb7b7c698ee8fe876670286d |
kpatch-patch-5_14_0-284_11_1-debugsource-1-2.el9_2.x86_64.rpm
|
SHA-256: edecce194c278e9af1ceab177bfaf00d524b0315487186b4f3802e46b3069258 |
kpatch-patch-5_14_0-284_18_1-1-1.el9_2.x86_64.rpm
|
SHA-256: 22c1da62d875d2afd0bf0d108ffc5476036eb171c1f61a880ca6731c611de5b4 |
kpatch-patch-5_14_0-284_18_1-debuginfo-1-1.el9_2.x86_64.rpm
|
SHA-256: 85c21694e7ff4c978f31163e911161b99d4f519e05c9e55158fd572400c44457 |
kpatch-patch-5_14_0-284_18_1-debugsource-1-1.el9_2.x86_64.rpm
|
SHA-256: c4a3c74e380e02bd98d35877b8052b38d73b26848fc91d60a98fbe5dd8b19b5b |