Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:5628 - Security Advisory
Issued:
2023-10-10
Updated:
2023-10-10

RHSA-2023:5628 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
  • kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776)
  • kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128)
  • kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head (CVE-2023-1095)
  • kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • avoid unnecessary page fault retires on shared memory types (BZ#2221102)
  • [Hyper-V][RHEL-8] Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2227261)
  • kernel-devel RPM cross-compiled by CKI contains host-arch scripts (BZ#2232139)
  • iavf: hang in iavf_remove() - SNO node hangs after running systemctl reboot (BZ#2232405)
  • netfilter: RHEL 8.8 phase 2 backports from upstream (BZ#2236818)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2173973 - CVE-2023-1095 kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
  • BZ - 2181891 - CVE-2023-1637 kernel: save/restore speculative MSRs during S3 suspend/resume
  • BZ - 2225097 - CVE-2023-3776 kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
  • BZ - 2225201 - CVE-2023-3609 kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails
  • BZ - 2225511 - CVE-2023-4128 kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route

CVEs

  • CVE-2023-1095
  • CVE-2023-1637
  • CVE-2023-3609
  • CVE-2023-3776
  • CVE-2023-4128

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Red Hat Enterprise Linux Server - TUS 8.4

SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
ppc64le
bpftool-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 7a29d84e95b7955aba6d5b327a03198e746166728f4af7b8f5baa640fd225cb9
bpftool-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: cf8b7e66debd770c0bc9f4183a9744d7282f2ece916b6875d2683b4fc680c309
kernel-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 9b4114998c326d00084d7b5f06483110b4859bdea52d1ab3eb462c1a1c2f23dc
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 1d6fa6fe386af2269a164b339449d5da8d99ac684dbf5b412655da50a1626b9e
kernel-cross-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: a242541cf1e01fc397a74eb5f9dad1991fcf4ee1e112166ad27ec16a06fff45f
kernel-debug-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: a909fc5a7b355d674703ddb0b57773561792bc1a5b82b4ded0a253ceca4aafb0
kernel-debug-core-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 88c7300d858038da57c532670ec919adda3e2f2469bcf290a6ea606ae87d2d5e
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 1213ea9c35351a430a27a7fd347f5f2a844858fe81dbe77d939d76b7f8de49ab
kernel-debug-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 8530afc084e36545c8f536317055e8d5d801dbda7a7ae79e2cacb380874b0caa
kernel-debug-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 2d5d636e829578f392e8589a3ab7ffe6b974e08c4ed136c70055ad483827b814
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 90a5b6537d34d442da4f4f79920cfa1cdf9483ad3ae051207399d325f66481f5
kernel-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 7d1ca28dd9da6750953081e9b094162be516f988c5307a18e34c685c43c42c2f
kernel-debuginfo-common-ppc64le-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 28d064ac655b19d766d3e80de7851e2b49a8e30266878e27973518e3b83eb6ae
kernel-devel-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 8c923e00a3f7ff39906faeb1610031215bdd0e2aaf752aa4da757601ff1e856e
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: f91e7d88bf67d765679cf9a4dbc51775a42d8397fcd540ae1c01dffa95c0c3d3
kernel-modules-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: d7bd87aea1f21ad299672ead01c409a54a36376c02476531e05488971dc7551e
kernel-modules-extra-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: a59b1f6cf19e694e47746ec627ad892209c83a5f26d8d4e88aebd4869139e36f
kernel-tools-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 89372a24aadc4ad68e353e29129b9f335b35182c80204c3326a8dac3cd78bdcd
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 8e31a250dd291000919ee47c30e3ced3ac17734dd22d6e91ca1feb391af79fb6
kernel-tools-libs-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: ac4e20051f8d3af8a240f0aa2b61a4a4ed17bdf10582a4e4235b00379beea407
perf-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 6dafe89e4417480caafa4d265f011e655d1ab801a761350a685e7e7bfd6997eb
perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: 28a25ad81122647c5bfec9cb0e99fae15b29e1404451f80c3da0b23a2b8272e7
python3-perf-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: b112fe78c30c255e499cbd2a39a7b18558334233676ecd5441390af3652893cd
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.ppc64le.rpm SHA-256: a6bae502c020dff3e907d923ac922ff949d2291d2c1f42492d7bda65932ab4e4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM
kernel-4.18.0-305.108.1.el8_4.src.rpm SHA-256: 3f74b6721f4e6a8a342ece298c45b7dbb5bcd160efee7ab8c6c446df96a355e8
x86_64
bpftool-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: fd7eaebcce393e13bad18a496c27ceff2e71f93772b26fc4e9f0dc75b9265c7a
bpftool-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2e558a59da66f002e49bbcb7193338f836f43872c9a1e1beffa01e5e073b1fda
kernel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 2200038364fb4b37f6b042bfdb7c365b152d424166510eb0fea35e7943590a6d
kernel-abi-stablelists-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 94b5de4bfd4a6a6b6823e01d4ab485079a5756ef982357f20a72575a5cb0d0e6
kernel-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: ca5f58720dc7060eb0f85120e326525ddc9246429fda26b0d47d1f799a93f732
kernel-cross-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 1b36987601e4cd7b50f5fa1cdae099ff707b831b68ab9685db13f19e28b80719
kernel-debug-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 6d789ad5f62bb9349be9fba4ec54c651a619effcef419f24979e7cf19c6e7747
kernel-debug-core-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dd1d7b5489f43addc05664f1c74cac45b48fc3cd8f9dc81fd2023ffc0e484b80
kernel-debug-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 8f2b5130f9235e437213bc56abbf48f7d1ba5646d2598a6a0faa8300ac625b17
kernel-debug-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c9a462784327c26a82b80635f6201075527a901f6634cab25ca9dae036ce4e6d
kernel-debug-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4647cfb222d7fc992f8e9b8a97350c3715cc39b52e634943a325ef47d169f155
kernel-debug-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b1fe821f5524589ab326b9f3029c457a9e824932d304b6de010a7108f908455e
kernel-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 67772c4f45a5f32a7d00069438f9b42f46e35ef9f7b3e5b62adac3e0754f3c6f
kernel-debuginfo-common-x86_64-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 720a4b4b5da41c743b10c8a6c31d40c1d5cf517ad9fcd2de23a4978b78a1ab65
kernel-devel-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7e6f64429d354b5a932bb555aafad7ba32364e1fb470f5558271459cf448a4f7
kernel-doc-4.18.0-305.108.1.el8_4.noarch.rpm SHA-256: 4f49cbc33b72337289aea9c34837a64f0172f19d068c9355b663b2ec8a6f940f
kernel-headers-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 57c00903d13425746ec8b93108784de30052fde2e3423bf65b9c518e90bb95ca
kernel-modules-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 3566be1c5545bf55519714c3f7912cf372617185330bb8653a9ab02018f7f2f9
kernel-modules-extra-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 13e586ff72b623ad79cab35fb5ae78243e8274a33d373072fdd5f89beffbe2d2
kernel-tools-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: c29bb68db78e8af424106bb28d0707b985ba2278b9a56ad4bc47cfdef602ceef
kernel-tools-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: b6a042e045f75daa94bed22d95941bd454305e1543cf008af273a8f4d94a37f0
kernel-tools-libs-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 959f230c1fa67c8092a64ea0abf960f45839342eb0ed53ba8882b6262a98b9b4
perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 4f6e73b4b9b6aadf988ce70f05075ce270f7870ddcbb083723b3eb1ada62a006
perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: dc7127f211533a7c15de5b58da13d3c78db63e08cd6d5269cdb2ba7f270d6e5e
python3-perf-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7253996e612bff40e317506c741c9c8e2867fbf0d1b4a867ccc50486af1f5fd0
python3-perf-debuginfo-4.18.0-305.108.1.el8_4.x86_64.rpm SHA-256: 7cbc0365282c0abdcc95a8d9af6292a8208c7257d3b55d70c12e6751c6a76991

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility