Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8809: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
  • CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Data
#vulnerability#mac#linux#red_hat#intel#ibm#dell#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)
  • kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • x86/intel: processors require energy_perf_bias setting (BZ#2102103)
  • System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2112264)
  • Fix SCHED_WARN_ON deadlock (BZ#2125422)
  • Starting VMs on a KVM-host with EL8.6-kernel sometimes produces timejumps into the future for other already running guest-VMs [rhel.8] (BZ#2125671)
  • RHEL8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127850)
  • vfio zero page mappings fail after 2M instances (BZ#2128516)
  • The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2129728)
  • ice: Driver Update up to 5.19 (BZ#2130993)
  • virtio-net: support XDP when not more queues (BZ#2131740)
  • VMs hang after migration (BZ#2131756)
  • Update NVME subsystem with bug fixes and minor changes (BZ#2132555)
  • [HPE BUG] Premature swapping with swappiness=0 while there’s still plenty of pagecache to be reclaimed. (BZ#2133831)
  • nf_conntrack causing nfs to stall (BZ#2134089)
  • Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135814)
  • [ice] Intel E810 PTP clock glitching (BZ#2136037)
  • ice: arp replies not making it to switch (BZ#2136043)
  • [ice]configure link-down-on-close on and change interface mtu to 9000,the interface can’t up (BZ#2136217)
  • ice: dump additional CSRs for Tx hang debugging (BZ#2136514)
  • crypto/testmgr.c should not list dh, ecdh as .fips_allowed = 1 (BZ#2136525)
  • FIPS module identification via name and version (BZ#2136540)
  • FIPS self-tests for RSA pkcs7 signature verification (BZ#2137316)
  • After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138158)
  • WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138954)
  • [DELL EMC 8.6-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139217)
  • Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139581)
  • Laser bias information can’t be shown by ethtool on rhel8.6 (BZ#2139638)
  • Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140144)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2069793 - CVE-2022-1158 kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
  • BZ - 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

x86_64

bpftool-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 6417510b4db524a13af2362f679dc65cf8cf92b71c500df1daff8f1e2b88a19c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5dfeec009b65aa2d0a570ad40558ee5d33b2fe49e414e9acbaccea773b099f5d

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5d33220637db3eb7ed7e5d77c93379406b1118f950b2c50d1c274f9c6902e463

kernel-cross-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 80634324a8b7d41f63993f0f060bfb4f98ebebe35f656e6388421b77688ec016

kernel-debug-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: e1a13af25c770ba38939778f9ed179795ae211775bbf5af561bbc766d5724790

kernel-debug-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: bae28cf6fb0c717c4cfae0337f8bac2933c0d1a73da48e585bab617fdae74f01

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debug-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: edc2f0012cf0d60d4a2ddb11716fbd4d538d701deeb022db3a813f824f263a9d

kernel-debug-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 4e4912b887bb014782c059c67ba140285b71d33f3833d397b1d05e4b02880bee

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cbe8bd2c803e9071243916b084222778a5b00174eb24756eca749ce4ede28616

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: a07d1ac5c64d304d1435c8db7ccdc6374bc78a312a907f6b5f9e1af590058233

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 495af1548bbf40dd384443af97252c2d0e66f91d836e225cac2a6003d0fbae95

kernel-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ccb393bf7e8bf314075b1af476d98c0dc68a58bbb6fdcf794af15245e4c9e37c

kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 72e2f9bdf0dd1e071076e1337fec52cfa441ff8e55f727014ee8abb2b5fbf635

kernel-tools-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 140e4fd764b0c16483893b0e59489265cb799e7cafd8b56e09de0a2ee4fb9e40

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 3b0457aa714f3de203f7495512b56441fd936a485187466d977d0b2441f1e082

perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5c30af1eccbf173d749d677d242890dfb2d99acba0f1b1e08b478e77aa00a33d

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cef302bc9470263fff04b540a0cab6051fde2372e3d1a466dbf87f2393d54b05

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

x86_64

bpftool-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 6417510b4db524a13af2362f679dc65cf8cf92b71c500df1daff8f1e2b88a19c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5dfeec009b65aa2d0a570ad40558ee5d33b2fe49e414e9acbaccea773b099f5d

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5d33220637db3eb7ed7e5d77c93379406b1118f950b2c50d1c274f9c6902e463

kernel-cross-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 80634324a8b7d41f63993f0f060bfb4f98ebebe35f656e6388421b77688ec016

kernel-debug-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: e1a13af25c770ba38939778f9ed179795ae211775bbf5af561bbc766d5724790

kernel-debug-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: bae28cf6fb0c717c4cfae0337f8bac2933c0d1a73da48e585bab617fdae74f01

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debug-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: edc2f0012cf0d60d4a2ddb11716fbd4d538d701deeb022db3a813f824f263a9d

kernel-debug-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 4e4912b887bb014782c059c67ba140285b71d33f3833d397b1d05e4b02880bee

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cbe8bd2c803e9071243916b084222778a5b00174eb24756eca749ce4ede28616

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: a07d1ac5c64d304d1435c8db7ccdc6374bc78a312a907f6b5f9e1af590058233

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 495af1548bbf40dd384443af97252c2d0e66f91d836e225cac2a6003d0fbae95

kernel-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ccb393bf7e8bf314075b1af476d98c0dc68a58bbb6fdcf794af15245e4c9e37c

kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 72e2f9bdf0dd1e071076e1337fec52cfa441ff8e55f727014ee8abb2b5fbf635

kernel-tools-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 140e4fd764b0c16483893b0e59489265cb799e7cafd8b56e09de0a2ee4fb9e40

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 3b0457aa714f3de203f7495512b56441fd936a485187466d977d0b2441f1e082

perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5c30af1eccbf173d749d677d242890dfb2d99acba0f1b1e08b478e77aa00a33d

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cef302bc9470263fff04b540a0cab6051fde2372e3d1a466dbf87f2393d54b05

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

s390x

bpftool-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 3f172e5b15dbcbed7deecb5b897f12a6cd2634bcac35f605cbfbd376b38e9789

bpftool-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 9b4bd2c4a7a90e4153e53a207e94a90c327a45854d82fbfeb6d24634c3145bdc

kernel-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 64e27e9f51ac1946a17e0c4090a95000f1b2e90595a7c3edc42a250aaea888eb

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: f037b1cf3a4c90912449c39dcbf6ec3027c41b8361eae08bb37c98be6d84f85b

kernel-cross-headers-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 463fd92530176336798a4664e966b22dbc27bb0f4709c63d104d6b9b1bb04424

kernel-debug-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: f1c215814aff0ee4fd7888ed5776921341609a51241798bcee38194f875daabe

kernel-debug-core-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: d3d3ff072648a52f818e9bc33d46df505705ac75c827f0be5a7b027e88ee5971

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 00a046a2bbf7dbdfb7961ba199fbc5bd97698206c841b00c83db0e226ab9347f

kernel-debug-devel-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 811f1f4ee17b4f92d14ddfac9ee944d287360f1675b9e33410e8b6f21526ac26

kernel-debug-modules-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 7dbdb25b1eb8f4160d01b6d8b7498abe6b627f3dc65214f0715aaa62466f3052

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 08ace80e318cbc9c026fa0a649ea3c694d23d07c40b44aba371908e0d6bf678e

kernel-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: e58ea85fc08e662b2587b0bee788bfcbeab6bf31f1ae19deb2be5df722b3b63a

kernel-debuginfo-common-s390x-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: b5e649f1deee900d18318ff8063404c1d2b085e93ad083276bbeb6ed81d50c48

kernel-devel-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 714386f81eb05006b2f0f057db5e18a7ac77f62a8899e2524f3941acab73f5d9

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 1a95b2675601af903c6aaeafa6aa35a0be3d59fbe1ea9161ac209024933b5d90

kernel-modules-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 4d579699dbd2dc9c4ec612ff1b16d7ad07483eac08979968aae86449422e3b32

kernel-modules-extra-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 717aad3c15f52dfe692b1dade98c453e0ab1540831e56316aca0199dc957a476

kernel-tools-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: d48cda50a0d7cf99f41c4d5d0a270eeefbfbe19607504d1dc2ea946052db99b7

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 627897c10277df4cbf3f0bef5edb2f2d4a4a91560136039be74ac07e66611046

kernel-zfcpdump-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 964bb66544746cce03def778cd946a956b9b968c5b95dd80b5854af723a9dfa5

kernel-zfcpdump-core-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: f69749db3a2501c31f4d958d56a8c75b5fbd41e9044496c071862d5e9ed874e6

kernel-zfcpdump-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 6f484928b54d01aef415ebd25a2b5cdeef2994bec72f7e82406782aad94c1d0f

kernel-zfcpdump-devel-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: bae8847b8ce853958bf34e578422059c0f3dcc5cff5335c03c5d8db6a3e4e87d

kernel-zfcpdump-modules-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 505cca2522302644a20899c80c203f35cb425dcd3b1b35933728ee87f995a046

kernel-zfcpdump-modules-extra-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 18c5d7415e9432142aa80e0325dd8c23e6c115aa05aafc6956137659b4500d22

perf-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 84aa7809f4ca930d1def71200ae26919272d8a79f5454cd653701c465ceced6d

perf-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 1edd1038b326d51b1485642de349adc7eb7d361065466e796e378d724c2fcf78

python3-perf-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: c15ce7973ac9479772f48f02b878b13652de5d51eeaef70b331942b3417bbe8d

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.s390x.rpm

SHA-256: 7b1d8379c36643a1925bda14f8fc2eca087e520db8de816a3ea717917afc4976

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

ppc64le

bpftool-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c7f1d334e7a587417a587333ea9bc6be04f29ad9f3ace7df581eb797a0a4050c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 4e645a32dc9498b2ff9a03c3989b3f2ab913802503c5aa8c85f54bdaae22a51f

kernel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 38a0a4168bd8c799e6a847da9e13fbfcfef955eaf21db871f7a8870a289983f8

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c18ffac59d5cee3432a1c66bb678dc247a47ce0ef30e93d7b003283eab41a4f5

kernel-cross-headers-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: b731ee8e33e8ee13c426a18e53c40607e4e0404bd491255dcac4fbe4b13aac44

kernel-debug-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 3ab0204172cad74a872c7dc16c041f011f04bf777fca38b8e2b3b56bd3853ccf

kernel-debug-core-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 50c985aa62ab0b07197bbc50b530da666556af72c6a84bf0429b4ece89ea566d

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: a0decee110f186ab30700ce93a9707fc3af17cf33eba9b2af49ac03bb6f22549

kernel-debug-devel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 25ffbaa9b6e9bfb71fabe0906e8f92e16b15827161c428328ca1ddf93ca7c4ab

kernel-debug-modules-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: d5bee9cf6e6185a06af444171b591af466a23d0b0084fe25043328b78d9c1805

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: a5bfc2b418fea10bb7dcac3ac6838ed7538b4f2d4d0ba1698402ceaf309a1ade

kernel-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 61798d1b9407e2a38be623496b737502288bbde40abeefdc91d0591d67a57bdb

kernel-debuginfo-common-ppc64le-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 887763eff58cef21b598b307d3f5ec77377b7ee8441631edce3c6528ed2e2ecb

kernel-devel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: b28582227a1d76826e2d695ebe0e9152e5c3587719b92beb821397403557fbe5

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 8840a14afabd31a8f807cb01203ec62681a9858b4bbf2ec401b1d54939c3d4d6

kernel-modules-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 40f53ffa370cce6fbba5f9af5a29e72afc048acb91e9341fe61b3e6ea4d9ee01

kernel-modules-extra-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 50320abcc387efc7fe7d1e9cec97b3746d796451d598dbd952fe593d4ea8ea56

kernel-tools-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: f289de15ce3ba5726a997dd5d3e1aa53749e86dfe4d12afa45b26052e277f65d

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 13169276e3e543e0940c634129ea1fa7b9211065128d0a0fdbea8eed976e82c8

kernel-tools-libs-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c624187ff49263da084d74574434509c6e1c36b4a06040daf46d8a2a538d3c5f

perf-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 66ac13d763b0f1102aa50695e5210f44fb4fc522dded97c494133ba2c9477adb

perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: d583aa2fe0958a256591c6ee926a0fa3ada42da854b5ab0309bf2ddcc45b73c8

python3-perf-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 9a46c01f177b1f7229cc95ea0a4f15a28dd6d67a24ae586bbdb8f1e58bb28dae

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 8b7ac27093159dd1ccc04fce86a83179b33b920e372c6c7bf8e9eaf2ea448c7b

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: a07d1ac5c64d304d1435c8db7ccdc6374bc78a312a907f6b5f9e1af590058233

kernel-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 495af1548bbf40dd384443af97252c2d0e66f91d836e225cac2a6003d0fbae95

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5c30af1eccbf173d749d677d242890dfb2d99acba0f1b1e08b478e77aa00a33d

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

x86_64

bpftool-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 6417510b4db524a13af2362f679dc65cf8cf92b71c500df1daff8f1e2b88a19c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5dfeec009b65aa2d0a570ad40558ee5d33b2fe49e414e9acbaccea773b099f5d

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5d33220637db3eb7ed7e5d77c93379406b1118f950b2c50d1c274f9c6902e463

kernel-cross-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 80634324a8b7d41f63993f0f060bfb4f98ebebe35f656e6388421b77688ec016

kernel-debug-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: e1a13af25c770ba38939778f9ed179795ae211775bbf5af561bbc766d5724790

kernel-debug-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: bae28cf6fb0c717c4cfae0337f8bac2933c0d1a73da48e585bab617fdae74f01

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debug-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: edc2f0012cf0d60d4a2ddb11716fbd4d538d701deeb022db3a813f824f263a9d

kernel-debug-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 4e4912b887bb014782c059c67ba140285b71d33f3833d397b1d05e4b02880bee

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cbe8bd2c803e9071243916b084222778a5b00174eb24756eca749ce4ede28616

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: a07d1ac5c64d304d1435c8db7ccdc6374bc78a312a907f6b5f9e1af590058233

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 495af1548bbf40dd384443af97252c2d0e66f91d836e225cac2a6003d0fbae95

kernel-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ccb393bf7e8bf314075b1af476d98c0dc68a58bbb6fdcf794af15245e4c9e37c

kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 72e2f9bdf0dd1e071076e1337fec52cfa441ff8e55f727014ee8abb2b5fbf635

kernel-tools-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 140e4fd764b0c16483893b0e59489265cb799e7cafd8b56e09de0a2ee4fb9e40

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 3b0457aa714f3de203f7495512b56441fd936a485187466d977d0b2441f1e082

perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5c30af1eccbf173d749d677d242890dfb2d99acba0f1b1e08b478e77aa00a33d

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cef302bc9470263fff04b540a0cab6051fde2372e3d1a466dbf87f2393d54b05

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

aarch64

bpftool-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 1bc0e0d922f7a211cf960694dfc77c8baafcbef33a658b69adb80f00555cf53e

bpftool-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: f31869dea639c7c60b8744714475dd342c3aaec5a792908895f6217d6974930f

kernel-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: f1d2164819b0f520c0405750686f6fd9ef71c5d48f164f6912d9b8571954fa90

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 1bdf9fe4ddcfc2818774a64d42b208d4865f3676db509b8c465a372a4b203480

kernel-cross-headers-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 58577c3068318e57da98d1d287bd331adb5dfe0f4093a01c6624ff6362250b16

kernel-debug-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 28d9f848a6224f0e600b63906e9e379e2dd787c473525ac7abed6bcd7601c8ff

kernel-debug-core-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: fb7cef517fd9b3b8af337a1b996141b4eab0810e95998adb9a1157bb241e0fe9

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 7b4797399c3ff2d12b167f9f05189654a328ad9d64da3490585912786f53c578

kernel-debug-devel-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 0ead20f71a0147506ff2725ec090a4c7f0b0ffcaedc10293cc9fe8c2cd49af7f

kernel-debug-modules-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: eed3aa97a97540990ac6147f0ca0010d160fe35d8fa9d547846ba398d1edf1cd

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: a76942730fa9d37866bcf2f3899903c2bfff508c298769abcf90ec105b2e3e84

kernel-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 5d7b2e6739dd2af3760aaa91778d453f9d5f13a3be2a35993442e3d86dbba772

kernel-debuginfo-common-aarch64-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 656a77f026cf9196dc0b5d6b1e4606c362955944cfd8825a6fb8e37f7f1d7bd3

kernel-devel-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 77bd8ee2ae2af30313a1726f6d44c46b4fb1180525048e467ffd55fd8cf2bf06

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: db031972a56c871c28041415ebb6d59ec5afa2397eebbfdac093c2285b6a06fd

kernel-modules-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 53f2c3d1c6c402c5b2f063913d7bebe8054ad729678167aeba38a842971e5959

kernel-modules-extra-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: b069ec1194b4856dd47d2b25f0a6dce0b31efba2469f6d5eec08a74ea44437b4

kernel-tools-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: a22d22b6e4843acd679a6a9a63aaffa5d833c4ff2b8003421af8a0c911ad60c0

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 31b6e4cf0f0163df2d40739fa14ee0d88b30c4649eb5ecb37b143e4808273095

kernel-tools-libs-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 53711e59d747b52f9aa6ee6d1bd55145c43b9aa232f8b7f140ad439649bb1462

perf-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 952dc1c5e7fec38fa33a4b3cf0e8165bb8bed8a84e5fcfe184943ea2204d3eac

perf-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: f6bd3abb58a081549ac3f7bbea0b9ee7a91f054d5284283ccd7bacbd4630a62d

python3-perf-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 3dce6027c984d0fc92ac87e27185d86681ce85cb557d1bfff0a1e732863bbc42

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 8da9cb364ef34cfc855285fa0dbe48ad7b5607bb67aa31e8506e8e07797d410d

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

ppc64le

bpftool-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c7f1d334e7a587417a587333ea9bc6be04f29ad9f3ace7df581eb797a0a4050c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 4e645a32dc9498b2ff9a03c3989b3f2ab913802503c5aa8c85f54bdaae22a51f

kernel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 38a0a4168bd8c799e6a847da9e13fbfcfef955eaf21db871f7a8870a289983f8

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c18ffac59d5cee3432a1c66bb678dc247a47ce0ef30e93d7b003283eab41a4f5

kernel-cross-headers-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: b731ee8e33e8ee13c426a18e53c40607e4e0404bd491255dcac4fbe4b13aac44

kernel-debug-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 3ab0204172cad74a872c7dc16c041f011f04bf777fca38b8e2b3b56bd3853ccf

kernel-debug-core-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 50c985aa62ab0b07197bbc50b530da666556af72c6a84bf0429b4ece89ea566d

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: a0decee110f186ab30700ce93a9707fc3af17cf33eba9b2af49ac03bb6f22549

kernel-debug-devel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 25ffbaa9b6e9bfb71fabe0906e8f92e16b15827161c428328ca1ddf93ca7c4ab

kernel-debug-modules-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: d5bee9cf6e6185a06af444171b591af466a23d0b0084fe25043328b78d9c1805

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: a5bfc2b418fea10bb7dcac3ac6838ed7538b4f2d4d0ba1698402ceaf309a1ade

kernel-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 61798d1b9407e2a38be623496b737502288bbde40abeefdc91d0591d67a57bdb

kernel-debuginfo-common-ppc64le-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 887763eff58cef21b598b307d3f5ec77377b7ee8441631edce3c6528ed2e2ecb

kernel-devel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: b28582227a1d76826e2d695ebe0e9152e5c3587719b92beb821397403557fbe5

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 8840a14afabd31a8f807cb01203ec62681a9858b4bbf2ec401b1d54939c3d4d6

kernel-modules-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 40f53ffa370cce6fbba5f9af5a29e72afc048acb91e9341fe61b3e6ea4d9ee01

kernel-modules-extra-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 50320abcc387efc7fe7d1e9cec97b3746d796451d598dbd952fe593d4ea8ea56

kernel-tools-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: f289de15ce3ba5726a997dd5d3e1aa53749e86dfe4d12afa45b26052e277f65d

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 13169276e3e543e0940c634129ea1fa7b9211065128d0a0fdbea8eed976e82c8

kernel-tools-libs-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: c624187ff49263da084d74574434509c6e1c36b4a06040daf46d8a2a538d3c5f

perf-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 66ac13d763b0f1102aa50695e5210f44fb4fc522dded97c494133ba2c9477adb

perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: d583aa2fe0958a256591c6ee926a0fa3ada42da854b5ab0309bf2ddcc45b73c8

python3-perf-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 9a46c01f177b1f7229cc95ea0a4f15a28dd6d67a24ae586bbdb8f1e58bb28dae

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 8b7ac27093159dd1ccc04fce86a83179b33b920e372c6c7bf8e9eaf2ea448c7b

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.36.1.el8_6.src.rpm

SHA-256: 2966d5109eb570286997b4493b5993ec1866a29b2f71cd7ba2737adc59727a14

x86_64

bpftool-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 6417510b4db524a13af2362f679dc65cf8cf92b71c500df1daff8f1e2b88a19c

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5dfeec009b65aa2d0a570ad40558ee5d33b2fe49e414e9acbaccea773b099f5d

kernel-abi-stablelists-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: f817eb6388d04d5bfa6a53e50d5feba3635bfc682eac5851758172bd00daae76

kernel-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5d33220637db3eb7ed7e5d77c93379406b1118f950b2c50d1c274f9c6902e463

kernel-cross-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 80634324a8b7d41f63993f0f060bfb4f98ebebe35f656e6388421b77688ec016

kernel-debug-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: e1a13af25c770ba38939778f9ed179795ae211775bbf5af561bbc766d5724790

kernel-debug-core-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: bae28cf6fb0c717c4cfae0337f8bac2933c0d1a73da48e585bab617fdae74f01

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debug-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: edc2f0012cf0d60d4a2ddb11716fbd4d538d701deeb022db3a813f824f263a9d

kernel-debug-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 4e4912b887bb014782c059c67ba140285b71d33f3833d397b1d05e4b02880bee

kernel-debug-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cbe8bd2c803e9071243916b084222778a5b00174eb24756eca749ce4ede28616

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: a07d1ac5c64d304d1435c8db7ccdc6374bc78a312a907f6b5f9e1af590058233

kernel-doc-4.18.0-372.36.1.el8_6.noarch.rpm

SHA-256: 3c5ce3ddd88fee08db923112a508b4e5e40dc2e12c06e8ec0d3fc3edf1fe68a0

kernel-headers-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 495af1548bbf40dd384443af97252c2d0e66f91d836e225cac2a6003d0fbae95

kernel-modules-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ccb393bf7e8bf314075b1af476d98c0dc68a58bbb6fdcf794af15245e4c9e37c

kernel-modules-extra-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 72e2f9bdf0dd1e071076e1337fec52cfa441ff8e55f727014ee8abb2b5fbf635

kernel-tools-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 140e4fd764b0c16483893b0e59489265cb799e7cafd8b56e09de0a2ee4fb9e40

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

kernel-tools-libs-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 3b0457aa714f3de203f7495512b56441fd936a485187466d977d0b2441f1e082

perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 5c30af1eccbf173d749d677d242890dfb2d99acba0f1b1e08b478e77aa00a33d

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: cef302bc9470263fff04b540a0cab6051fde2372e3d1a466dbf87f2393d54b05

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 524f1ce8432f93481a41968364683ebac2efbd1413ee58187d5d662b69c4db2c

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: ddbf4e13046719861816fc8c66d7f4c9b984cd94c2836021861162b594d0fbe9

kernel-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 7b698ed6329da457c79202f63cf75b2fef829e2d8da736fb07cf9b0ec6c2c696

kernel-debuginfo-common-x86_64-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 67876a626618ea28407b623a7471e377926acdae28023098bd87ebbafec0db1b

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: af8cb87f74a683a47f485fa81b99b7c54d57609d3d62e05fa4d646333d3eaa5b

kernel-tools-libs-devel-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 196ed23bff7a5dc9582863e6d71cd7bf31e8e0840328e1960e14e4e402a936de

perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: b857c2bedd88489288f66c5ab9ebac7e3bce9c9284b2a4feccf80f9a9efb98be

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.x86_64.rpm

SHA-256: 0e1e0dd840aa619bb6b7426851e0cbabb67d6f646fbd3789d58c66f55d00814f

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 4e645a32dc9498b2ff9a03c3989b3f2ab913802503c5aa8c85f54bdaae22a51f

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: a0decee110f186ab30700ce93a9707fc3af17cf33eba9b2af49ac03bb6f22549

kernel-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 61798d1b9407e2a38be623496b737502288bbde40abeefdc91d0591d67a57bdb

kernel-debuginfo-common-ppc64le-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 887763eff58cef21b598b307d3f5ec77377b7ee8441631edce3c6528ed2e2ecb

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 13169276e3e543e0940c634129ea1fa7b9211065128d0a0fdbea8eed976e82c8

kernel-tools-libs-devel-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 5e7f2a1bde1f9b5f7f74382dad61b804658f67f727b374879404e208b27d854a

perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: d583aa2fe0958a256591c6ee926a0fa3ada42da854b5ab0309bf2ddcc45b73c8

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.ppc64le.rpm

SHA-256: 8b7ac27093159dd1ccc04fce86a83179b33b920e372c6c7bf8e9eaf2ea448c7b

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: f31869dea639c7c60b8744714475dd342c3aaec5a792908895f6217d6974930f

kernel-debug-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 7b4797399c3ff2d12b167f9f05189654a328ad9d64da3490585912786f53c578

kernel-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 5d7b2e6739dd2af3760aaa91778d453f9d5f13a3be2a35993442e3d86dbba772

kernel-debuginfo-common-aarch64-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 656a77f026cf9196dc0b5d6b1e4606c362955944cfd8825a6fb8e37f7f1d7bd3

kernel-tools-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 31b6e4cf0f0163df2d40739fa14ee0d88b30c4649eb5ecb37b143e4808273095

kernel-tools-libs-devel-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 5b392eb64fffb0af1a7a08e741fb7202a85d505bbeab4e5a181fb0cda233e1d0

perf-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: f6bd3abb58a081549ac3f7bbea0b9ee7a91f054d5284283ccd7bacbd4630a62d

python3-perf-debuginfo-4.18.0-372.36.1.el8_6.aarch64.rpm

SHA-256: 8da9cb364ef34cfc855285fa0dbe48ad7b5607bb67aa31e8506e8e07797d410d

Related news

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-0058-01

Red Hat Security Advisory 2023-0058-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:9111: Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.54 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)

Red Hat Security Advisory 2022-9082-01

Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.

RHSA-2022:9082: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...

RHSA-2022:9040: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.3 security update

Red Hat Advanced Cluster Management for Kubernetes 2.6.3 General Availability release images, which provide security updates, fix bugs, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-41912: crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements

Red Hat Security Advisory 2022-8973-01

Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-8941-01

Red Hat Security Advisory 2022-8941-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8973: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...

RHSA-2022:8989: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8940: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8941: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8889: Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update

Openshift Logging Bug Fix Release (5.3.14) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-42003: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS * CVE-2022-42004: jackson-databind: use of deeply nested arrays

Red Hat Security Advisory 2022-8831-01

Red Hat Security Advisory 2022-8831-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8809-01

Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8831: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-8765-01

Red Hat Security Advisory 2022-8765-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8768-01

Red Hat Security Advisory 2022-8768-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8765: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-8673-01

Red Hat Security Advisory 2022-8673-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2022-8686-01

Red Hat Security Advisory 2022-8686-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2022-8685-01

Red Hat Security Advisory 2022-8685-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability.

RHSA-2022:8685: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

RHSA-2022:8673: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

RHSA-2022:8686: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

Red Hat Security Advisory 2022-7933-01

Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:8267: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-0854: ...

RHSA-2022:7933: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...

RHSA-2022:7683: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...

RHSA-2022:7444: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large argume...

CVE-2022-41686: en/security-disclosure/2022/2022-10.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.

Ubuntu Security Notice USN-5650-1

Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5468-1

Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5467-1

Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5416-1

Ubuntu Security Notice 5416-1 - Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service.