Headline
RHSA-2021:1578: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2019-18811: kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c
- CVE-2019-19523: kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver
- CVE-2019-19528: kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver
- CVE-2020-0431: kernel: possible out of bounds write in kbd_keycode of keyboard.c
- CVE-2020-11608: kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c
- CVE-2020-12114: kernel: DoS by corrupting mountpoint reference counter
- CVE-2020-12362: kernel: Integer overflow in Intel® Graphics Drivers
- CVE-2020-12363: kernel: Improper input validation in some Intel® Graphics Drivers
- CVE-2020-12364: kernel: Null pointer dereference in some Intel® Graphics Drivers
- CVE-2020-12464: kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c
- CVE-2020-14314: kernel: buffer uses out of index in ext3/4 filesystem
- CVE-2020-14356: kernel: Use After Free vulnerability in cgroup BPF component
- CVE-2020-15437: kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c
- CVE-2020-24394: kernel: umask not applied on filesystem without ACL support
- CVE-2020-25212: kernel: TOCTOU mismatch in the NFS client code
- CVE-2020-25284: kernel: incomplete permission checking for access to rbd devices
- CVE-2020-25285: kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c
- CVE-2020-25643: kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
- CVE-2020-25704: kernel: perf_event_parse_addr_filter memory
- CVE-2020-27786: kernel: use-after-free in kernel midi subsystem
- CVE-2020-27835: kernel: child process is able to access parent mm through hfi dev file handle
- CVE-2020-28974: kernel: slab-out-of-bounds read in fbcon
- CVE-2020-35508: kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
- CVE-2020-36322: kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
- CVE-2020-36557: kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown().
- CVE-2021-0342: kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege
- CVE-2021-0605: kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: Integer overflow in Intel® Graphics Drivers (CVE-2020-12362)
- kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
- kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
- kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
- kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
- kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
- kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
- kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
- kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
- kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
- kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
- kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
- kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
- kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
- kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
- kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
- kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
- kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
- kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
- kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
- kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
- kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
- kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 1777455 - CVE-2019-18811 kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c
- BZ - 1783434 - CVE-2019-19523 kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver
- BZ - 1783507 - CVE-2019-19528 kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver
- BZ - 1831726 - CVE-2020-12464 kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c
- BZ - 1833445 - CVE-2020-11608 kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c
- BZ - 1848084 - i_version is turned off whenever filesystem is remounted
- BZ - 1848652 - CVE-2020-12114 kernel: DoS by corrupting mountpoint reference counter
- BZ - 1853922 - CVE-2020-14314 kernel: buffer uses out of index in ext3/4 filesystem
- BZ - 1859244 - Failure when modifying bridge multicast-snooping from 0 to 1
- BZ - 1860479 - Unable to attach VLAN-based logical networks to a bond
- BZ - 1868453 - CVE-2020-14356 kernel: Use After Free vulnerability in cgroup BPF component
- BZ - 1869141 - CVE-2020-24394 kernel: umask not applied on filesystem without ACL support
- BZ - 1876840 - logs are filled with: sending ioctl to DM device without required privilege
- BZ - 1877575 - CVE-2020-25212 kernel: TOCTOU mismatch in the NFS client code
- BZ - 1879981 - CVE-2020-25643 kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
- BZ - 1882591 - CVE-2020-25285 kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c
- BZ - 1882594 - CVE-2020-25284 kernel: incomplete permission checking for access to rbd devices
- BZ - 1890373 - kernel version update cause qemu live migration failed
- BZ - 1895961 - CVE-2020-25704 kernel: perf_event_parse_addr_filter memory
- BZ - 1900933 - CVE-2020-27786 kernel: use-after-free in kernel midi subsystem
- BZ - 1901161 - CVE-2020-15437 kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c
- BZ - 1901709 - CVE-2020-27835 kernel: child process is able to access parent mm through hfi dev file handle
- BZ - 1902724 - CVE-2020-35508 kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
- BZ - 1903126 - CVE-2020-28974 kernel: slab-out-of-bounds read in fbcon
- BZ - 1903387 - fsfreeze of xfs filesystem can be significantly delayed in xfs_wait_buftarg if a process continues to grab and release buffers
- BZ - 1903983 - rootless mode doesn’t work
- BZ - 1911343 - blk_alloc_queue() ABI change
- BZ - 1915799 - CVE-2021-0342 kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege
- BZ - 1919889 - CVE-2020-0431 kernel: possible out of bounds write in kbd_keycode of keyboard.c
- BZ - 1930246 - CVE-2020-12362 kernel: Integer overflow in Intel® Graphics Drivers
- BZ - 1949560 - CVE-2020-36322 kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
CVEs
- CVE-2019-18811
- CVE-2019-19523
- CVE-2019-19528
- CVE-2020-0431
- CVE-2020-11608
- CVE-2020-12114
- CVE-2020-12362
- CVE-2020-12363
- CVE-2020-12364
- CVE-2020-12464
- CVE-2020-14314
- CVE-2020-14356
- CVE-2020-15437
- CVE-2020-24394
- CVE-2020-25212
- CVE-2020-25284
- CVE-2020-25285
- CVE-2020-25643
- CVE-2020-25704
- CVE-2020-27786
- CVE-2020-27835
- CVE-2020-28974
- CVE-2020-35508
- CVE-2020-36322
- CVE-2021-0342
- CVE-2021-0605
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
Red Hat Enterprise Linux for x86_64 8
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
s390x
bpftool-4.18.0-305.el8.s390x.rpm
SHA-256: d0f348036564e8dfd83411c7f270d60fc4461c3d073bc9a79bb59ef436be7eff
bpftool-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: c0e81202e1baa69822cee5e8d75b0412ef75767b9ea57bea830c3bf8295b6948
kernel-4.18.0-305.el8.s390x.rpm
SHA-256: 314ebc377bb8d727dcaa1149db8bd31452df51d2ef67a7161b6f8531d96d0a45
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.s390x.rpm
SHA-256: 0d5123cf27d61331b752faef77f9b01e64bd1c8caab59cb55fc07064b4ded3c4
kernel-cross-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 87a861d40dc10fc2d11cd7c6c1b954dbbb0cb6930f7bf9ba2a1690a4561cdaa5
kernel-debug-4.18.0-305.el8.s390x.rpm
SHA-256: b5d3b863de51f9f25c2bb1899082e3e80d558681ed046205f68e123977afe5c0
kernel-debug-core-4.18.0-305.el8.s390x.rpm
SHA-256: a45812cec60bcd919854681dc1166ffdbb0ad9f498cdcf94d858ef2b8d21c948
kernel-debug-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: ede9eaa112850515015540bd5ca6dbc09ad3b89ac77b613625156de6795dcc09
kernel-debug-devel-4.18.0-305.el8.s390x.rpm
SHA-256: b78b6a7c1e6719cfb4554e502765c229be384e045f1cc719e35ea0b5ee80a2c1
kernel-debug-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 4e0817c64b183dab1bb34bb10aa67cdb3d6ebdbc31db71dcbf91b297a656c560
kernel-debug-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 7e0496f23c0e8bdb065a7b3bfffb2f2c26a1819e92c2dd54d31c63f736e973bf
kernel-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 88e01f5fb708859694031f10886e27128efc8a0f4785e79d0dffc5edd89437ab
kernel-debuginfo-common-s390x-4.18.0-305.el8.s390x.rpm
SHA-256: b09f67f83b2797675e16f040c10e3733c8fa7aeb49c08c8c6aedcf990875d4af
kernel-devel-4.18.0-305.el8.s390x.rpm
SHA-256: c6dd6d16502e1109393670d44ee21583c57b28ecd9a49ab662c2897b53267c3d
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 979e3e48fb0da1233082a8508f3a3369a52be681353c6c6a81a94804d64fc1b3
kernel-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 074b810f3610297a654bed648e4ffe15b7673c204c5b5b80ba47b1f3a4f1ee83
kernel-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 2b118a83f5742147ad63b223991b3364701d81eb765828569d41ed1d4fd8ae45
kernel-tools-4.18.0-305.el8.s390x.rpm
SHA-256: a52fddd58ce0ce1a1eb60580c81195ea71352b1ec61be4c535a3420bcd51e181
kernel-tools-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: efdd1216ba17e87ab18f94a7e52acce62bcebd4253158c6880d987d9b800bc28
kernel-zfcpdump-4.18.0-305.el8.s390x.rpm
SHA-256: 2df211ab71f20b7912ed96c033f4aa8531f28b7cf742c2dc7d3e339a03fd1729
kernel-zfcpdump-core-4.18.0-305.el8.s390x.rpm
SHA-256: 9aa8b0eee8fd0ba4ad7fb66b205327485b96013329f8b429ad3093ee2b98685f
kernel-zfcpdump-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 55f72a95ef6b2fea81b1ae5219145154d99cef66bc63a4c951325cba6ad8b058
kernel-zfcpdump-devel-4.18.0-305.el8.s390x.rpm
SHA-256: 39017c7c573d8f78912a5b1e116fc6e4e1f0a69d67dea64161803d78a47fed69
kernel-zfcpdump-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 57a20533ae29016a9f85305a7d92d8e62b3ade46a366e860f6bd35d3c59a4737
kernel-zfcpdump-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: dd10b91950dcc99d8bda25b6a9dff6b638efef2fae5c229e14925671e08df2bd
perf-4.18.0-305.el8.s390x.rpm
SHA-256: 9a4937040759f85ee555794f47592397459b40efba1ca236f0cc19c8cc95c31d
perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 3edc31e1c3da28b49d1adcfe32e84e8d2fe51f51c5a1ab6d1c63a3a917d88ae6
python3-perf-4.18.0-305.el8.s390x.rpm
SHA-256: b5fb96252fa50b660fab91caad54ee54e63b03296d3c6551e3869536a1c2bc81
python3-perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: d314eda11c194c89dd3537937d8773601d9c929c2a20c55493ef03e96f38bd7a
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
s390x
bpftool-4.18.0-305.el8.s390x.rpm
SHA-256: d0f348036564e8dfd83411c7f270d60fc4461c3d073bc9a79bb59ef436be7eff
bpftool-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: c0e81202e1baa69822cee5e8d75b0412ef75767b9ea57bea830c3bf8295b6948
kernel-4.18.0-305.el8.s390x.rpm
SHA-256: 314ebc377bb8d727dcaa1149db8bd31452df51d2ef67a7161b6f8531d96d0a45
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.s390x.rpm
SHA-256: 0d5123cf27d61331b752faef77f9b01e64bd1c8caab59cb55fc07064b4ded3c4
kernel-cross-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 87a861d40dc10fc2d11cd7c6c1b954dbbb0cb6930f7bf9ba2a1690a4561cdaa5
kernel-debug-4.18.0-305.el8.s390x.rpm
SHA-256: b5d3b863de51f9f25c2bb1899082e3e80d558681ed046205f68e123977afe5c0
kernel-debug-core-4.18.0-305.el8.s390x.rpm
SHA-256: a45812cec60bcd919854681dc1166ffdbb0ad9f498cdcf94d858ef2b8d21c948
kernel-debug-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: ede9eaa112850515015540bd5ca6dbc09ad3b89ac77b613625156de6795dcc09
kernel-debug-devel-4.18.0-305.el8.s390x.rpm
SHA-256: b78b6a7c1e6719cfb4554e502765c229be384e045f1cc719e35ea0b5ee80a2c1
kernel-debug-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 4e0817c64b183dab1bb34bb10aa67cdb3d6ebdbc31db71dcbf91b297a656c560
kernel-debug-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 7e0496f23c0e8bdb065a7b3bfffb2f2c26a1819e92c2dd54d31c63f736e973bf
kernel-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 88e01f5fb708859694031f10886e27128efc8a0f4785e79d0dffc5edd89437ab
kernel-debuginfo-common-s390x-4.18.0-305.el8.s390x.rpm
SHA-256: b09f67f83b2797675e16f040c10e3733c8fa7aeb49c08c8c6aedcf990875d4af
kernel-devel-4.18.0-305.el8.s390x.rpm
SHA-256: c6dd6d16502e1109393670d44ee21583c57b28ecd9a49ab662c2897b53267c3d
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 979e3e48fb0da1233082a8508f3a3369a52be681353c6c6a81a94804d64fc1b3
kernel-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 074b810f3610297a654bed648e4ffe15b7673c204c5b5b80ba47b1f3a4f1ee83
kernel-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 2b118a83f5742147ad63b223991b3364701d81eb765828569d41ed1d4fd8ae45
kernel-tools-4.18.0-305.el8.s390x.rpm
SHA-256: a52fddd58ce0ce1a1eb60580c81195ea71352b1ec61be4c535a3420bcd51e181
kernel-tools-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: efdd1216ba17e87ab18f94a7e52acce62bcebd4253158c6880d987d9b800bc28
kernel-zfcpdump-4.18.0-305.el8.s390x.rpm
SHA-256: 2df211ab71f20b7912ed96c033f4aa8531f28b7cf742c2dc7d3e339a03fd1729
kernel-zfcpdump-core-4.18.0-305.el8.s390x.rpm
SHA-256: 9aa8b0eee8fd0ba4ad7fb66b205327485b96013329f8b429ad3093ee2b98685f
kernel-zfcpdump-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 55f72a95ef6b2fea81b1ae5219145154d99cef66bc63a4c951325cba6ad8b058
kernel-zfcpdump-devel-4.18.0-305.el8.s390x.rpm
SHA-256: 39017c7c573d8f78912a5b1e116fc6e4e1f0a69d67dea64161803d78a47fed69
kernel-zfcpdump-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 57a20533ae29016a9f85305a7d92d8e62b3ade46a366e860f6bd35d3c59a4737
kernel-zfcpdump-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: dd10b91950dcc99d8bda25b6a9dff6b638efef2fae5c229e14925671e08df2bd
perf-4.18.0-305.el8.s390x.rpm
SHA-256: 9a4937040759f85ee555794f47592397459b40efba1ca236f0cc19c8cc95c31d
perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 3edc31e1c3da28b49d1adcfe32e84e8d2fe51f51c5a1ab6d1c63a3a917d88ae6
python3-perf-4.18.0-305.el8.s390x.rpm
SHA-256: b5fb96252fa50b660fab91caad54ee54e63b03296d3c6551e3869536a1c2bc81
python3-perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: d314eda11c194c89dd3537937d8773601d9c929c2a20c55493ef03e96f38bd7a
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
s390x
bpftool-4.18.0-305.el8.s390x.rpm
SHA-256: d0f348036564e8dfd83411c7f270d60fc4461c3d073bc9a79bb59ef436be7eff
bpftool-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: c0e81202e1baa69822cee5e8d75b0412ef75767b9ea57bea830c3bf8295b6948
kernel-4.18.0-305.el8.s390x.rpm
SHA-256: 314ebc377bb8d727dcaa1149db8bd31452df51d2ef67a7161b6f8531d96d0a45
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.s390x.rpm
SHA-256: 0d5123cf27d61331b752faef77f9b01e64bd1c8caab59cb55fc07064b4ded3c4
kernel-cross-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 87a861d40dc10fc2d11cd7c6c1b954dbbb0cb6930f7bf9ba2a1690a4561cdaa5
kernel-debug-4.18.0-305.el8.s390x.rpm
SHA-256: b5d3b863de51f9f25c2bb1899082e3e80d558681ed046205f68e123977afe5c0
kernel-debug-core-4.18.0-305.el8.s390x.rpm
SHA-256: a45812cec60bcd919854681dc1166ffdbb0ad9f498cdcf94d858ef2b8d21c948
kernel-debug-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: ede9eaa112850515015540bd5ca6dbc09ad3b89ac77b613625156de6795dcc09
kernel-debug-devel-4.18.0-305.el8.s390x.rpm
SHA-256: b78b6a7c1e6719cfb4554e502765c229be384e045f1cc719e35ea0b5ee80a2c1
kernel-debug-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 4e0817c64b183dab1bb34bb10aa67cdb3d6ebdbc31db71dcbf91b297a656c560
kernel-debug-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 7e0496f23c0e8bdb065a7b3bfffb2f2c26a1819e92c2dd54d31c63f736e973bf
kernel-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 88e01f5fb708859694031f10886e27128efc8a0f4785e79d0dffc5edd89437ab
kernel-debuginfo-common-s390x-4.18.0-305.el8.s390x.rpm
SHA-256: b09f67f83b2797675e16f040c10e3733c8fa7aeb49c08c8c6aedcf990875d4af
kernel-devel-4.18.0-305.el8.s390x.rpm
SHA-256: c6dd6d16502e1109393670d44ee21583c57b28ecd9a49ab662c2897b53267c3d
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.s390x.rpm
SHA-256: 979e3e48fb0da1233082a8508f3a3369a52be681353c6c6a81a94804d64fc1b3
kernel-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 074b810f3610297a654bed648e4ffe15b7673c204c5b5b80ba47b1f3a4f1ee83
kernel-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: 2b118a83f5742147ad63b223991b3364701d81eb765828569d41ed1d4fd8ae45
kernel-tools-4.18.0-305.el8.s390x.rpm
SHA-256: a52fddd58ce0ce1a1eb60580c81195ea71352b1ec61be4c535a3420bcd51e181
kernel-tools-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: efdd1216ba17e87ab18f94a7e52acce62bcebd4253158c6880d987d9b800bc28
kernel-zfcpdump-4.18.0-305.el8.s390x.rpm
SHA-256: 2df211ab71f20b7912ed96c033f4aa8531f28b7cf742c2dc7d3e339a03fd1729
kernel-zfcpdump-core-4.18.0-305.el8.s390x.rpm
SHA-256: 9aa8b0eee8fd0ba4ad7fb66b205327485b96013329f8b429ad3093ee2b98685f
kernel-zfcpdump-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 55f72a95ef6b2fea81b1ae5219145154d99cef66bc63a4c951325cba6ad8b058
kernel-zfcpdump-devel-4.18.0-305.el8.s390x.rpm
SHA-256: 39017c7c573d8f78912a5b1e116fc6e4e1f0a69d67dea64161803d78a47fed69
kernel-zfcpdump-modules-4.18.0-305.el8.s390x.rpm
SHA-256: 57a20533ae29016a9f85305a7d92d8e62b3ade46a366e860f6bd35d3c59a4737
kernel-zfcpdump-modules-extra-4.18.0-305.el8.s390x.rpm
SHA-256: dd10b91950dcc99d8bda25b6a9dff6b638efef2fae5c229e14925671e08df2bd
perf-4.18.0-305.el8.s390x.rpm
SHA-256: 9a4937040759f85ee555794f47592397459b40efba1ca236f0cc19c8cc95c31d
perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: 3edc31e1c3da28b49d1adcfe32e84e8d2fe51f51c5a1ab6d1c63a3a917d88ae6
python3-perf-4.18.0-305.el8.s390x.rpm
SHA-256: b5fb96252fa50b660fab91caad54ee54e63b03296d3c6551e3869536a1c2bc81
python3-perf-debuginfo-4.18.0-305.el8.s390x.rpm
SHA-256: d314eda11c194c89dd3537937d8773601d9c929c2a20c55493ef03e96f38bd7a
Red Hat Enterprise Linux for Power, little endian 8
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
ppc64le
bpftool-4.18.0-305.el8.ppc64le.rpm
SHA-256: c814ef5ab7250f1ba476fe4ef14ab02b1faae520c81e822fc70c8db037116e6a
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 96a88907ff06a91056fbd304dbe280cf92bf5ed2f34b9e5219f8f11fac8dd422
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: d9c7543375a7147a7baae37a0953b189fe9a2f047379f3be117a072520a8f3da
kernel-cross-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 463f0bcb4174586cb0624f2868a21e8d65ad6ef5c84c9c90dd856b8d32436706
kernel-debug-4.18.0-305.el8.ppc64le.rpm
SHA-256: 86a19ce84f6a8b43e7f79752de3ef0a5a0c35fdb8f91027c1b8fd9846d5b33a4
kernel-debug-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: c3ddf9c565f8f36a8cffa2cf59ca434138ab2fa56c26e1aaf02bf2227d81e6d1
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debug-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2892809f07157bcdb4f52fcf67153a0aa1d6e4ce8af22a0822749d1063b28fd3
kernel-debug-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8309f891ca221cee19f204d413da0140b43930ec7f185c6d3047b0951299b9b2
kernel-debug-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 65fb50816852b46a1cfadfc5f3929decec335ecf03fc80734bb0cb049359774b
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8a36aff8b72dd458503967ebc16c017c165db6886f133ebe0843a7c85bdfa785
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 433f373bbb2c018a02d543da543236ae924f2f900b98cd539924e61a69ca965b
kernel-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8d2e7459bb4ba2a15333021f58b01d83153a3bf0ffbbd1c3617fbe5fcd8ffe8b
kernel-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 25809862a86ea5b7b5ba9cc8387a5c6f7e5aaa88872e12e9aaa19429f6245673
kernel-tools-4.18.0-305.el8.ppc64le.rpm
SHA-256: a23a4bd88a6acd0b00f4df9ceb8f5f3be49aeecf6b5eaea378440ced2666ab3e
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-4.18.0-305.el8.ppc64le.rpm
SHA-256: d6ec566b151194c4ddecf32dc338c34ef59772b3ab2cb475db156cd431fce5ee
perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 872000819cfd23f267c1139885f5c8aa09da9e9bf0654ab040624f472be7fc80
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 1fe65b0ac9e20c30530e34e5dcfa001103ab21b0a29348c066591b44e51b91d9
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
ppc64le
bpftool-4.18.0-305.el8.ppc64le.rpm
SHA-256: c814ef5ab7250f1ba476fe4ef14ab02b1faae520c81e822fc70c8db037116e6a
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 96a88907ff06a91056fbd304dbe280cf92bf5ed2f34b9e5219f8f11fac8dd422
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: d9c7543375a7147a7baae37a0953b189fe9a2f047379f3be117a072520a8f3da
kernel-cross-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 463f0bcb4174586cb0624f2868a21e8d65ad6ef5c84c9c90dd856b8d32436706
kernel-debug-4.18.0-305.el8.ppc64le.rpm
SHA-256: 86a19ce84f6a8b43e7f79752de3ef0a5a0c35fdb8f91027c1b8fd9846d5b33a4
kernel-debug-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: c3ddf9c565f8f36a8cffa2cf59ca434138ab2fa56c26e1aaf02bf2227d81e6d1
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debug-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2892809f07157bcdb4f52fcf67153a0aa1d6e4ce8af22a0822749d1063b28fd3
kernel-debug-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8309f891ca221cee19f204d413da0140b43930ec7f185c6d3047b0951299b9b2
kernel-debug-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 65fb50816852b46a1cfadfc5f3929decec335ecf03fc80734bb0cb049359774b
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8a36aff8b72dd458503967ebc16c017c165db6886f133ebe0843a7c85bdfa785
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 433f373bbb2c018a02d543da543236ae924f2f900b98cd539924e61a69ca965b
kernel-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8d2e7459bb4ba2a15333021f58b01d83153a3bf0ffbbd1c3617fbe5fcd8ffe8b
kernel-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 25809862a86ea5b7b5ba9cc8387a5c6f7e5aaa88872e12e9aaa19429f6245673
kernel-tools-4.18.0-305.el8.ppc64le.rpm
SHA-256: a23a4bd88a6acd0b00f4df9ceb8f5f3be49aeecf6b5eaea378440ced2666ab3e
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-4.18.0-305.el8.ppc64le.rpm
SHA-256: d6ec566b151194c4ddecf32dc338c34ef59772b3ab2cb475db156cd431fce5ee
perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 872000819cfd23f267c1139885f5c8aa09da9e9bf0654ab040624f472be7fc80
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 1fe65b0ac9e20c30530e34e5dcfa001103ab21b0a29348c066591b44e51b91d9
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
ppc64le
bpftool-4.18.0-305.el8.ppc64le.rpm
SHA-256: c814ef5ab7250f1ba476fe4ef14ab02b1faae520c81e822fc70c8db037116e6a
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 96a88907ff06a91056fbd304dbe280cf92bf5ed2f34b9e5219f8f11fac8dd422
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: d9c7543375a7147a7baae37a0953b189fe9a2f047379f3be117a072520a8f3da
kernel-cross-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 463f0bcb4174586cb0624f2868a21e8d65ad6ef5c84c9c90dd856b8d32436706
kernel-debug-4.18.0-305.el8.ppc64le.rpm
SHA-256: 86a19ce84f6a8b43e7f79752de3ef0a5a0c35fdb8f91027c1b8fd9846d5b33a4
kernel-debug-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: c3ddf9c565f8f36a8cffa2cf59ca434138ab2fa56c26e1aaf02bf2227d81e6d1
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debug-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2892809f07157bcdb4f52fcf67153a0aa1d6e4ce8af22a0822749d1063b28fd3
kernel-debug-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8309f891ca221cee19f204d413da0140b43930ec7f185c6d3047b0951299b9b2
kernel-debug-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 65fb50816852b46a1cfadfc5f3929decec335ecf03fc80734bb0cb049359774b
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8a36aff8b72dd458503967ebc16c017c165db6886f133ebe0843a7c85bdfa785
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 433f373bbb2c018a02d543da543236ae924f2f900b98cd539924e61a69ca965b
kernel-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8d2e7459bb4ba2a15333021f58b01d83153a3bf0ffbbd1c3617fbe5fcd8ffe8b
kernel-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 25809862a86ea5b7b5ba9cc8387a5c6f7e5aaa88872e12e9aaa19429f6245673
kernel-tools-4.18.0-305.el8.ppc64le.rpm
SHA-256: a23a4bd88a6acd0b00f4df9ceb8f5f3be49aeecf6b5eaea378440ced2666ab3e
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-4.18.0-305.el8.ppc64le.rpm
SHA-256: d6ec566b151194c4ddecf32dc338c34ef59772b3ab2cb475db156cd431fce5ee
perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 872000819cfd23f267c1139885f5c8aa09da9e9bf0654ab040624f472be7fc80
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 1fe65b0ac9e20c30530e34e5dcfa001103ab21b0a29348c066591b44e51b91d9
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux for ARM 64 8
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
aarch64
bpftool-4.18.0-305.el8.aarch64.rpm
SHA-256: 3aaa64071d6f62cd2a5bc116cac06652decb98b726b9943c32611f89af2f159a
bpftool-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1619b0ddaa814d3bd72b458b06385f57c19b53d79b7be1b6ac819d3e337dffb1
kernel-4.18.0-305.el8.aarch64.rpm
SHA-256: 1be22dd5640c99049c20869e3cf3029ce827d987e7877d58d4259d595f8a2aec
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.aarch64.rpm
SHA-256: 14dc3b337c67536a23152fb701863b96be78ae23c630b99c40e30202874c971c
kernel-cross-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: f808c48058e5d6d24dcff76f02fa137fbe98ba27c756353cbc58aa2cf10587ac
kernel-debug-4.18.0-305.el8.aarch64.rpm
SHA-256: 999ddbbf5c921b1d8344c54401056ac557fbe0f5026dceb04d10166f96883b7e
kernel-debug-core-4.18.0-305.el8.aarch64.rpm
SHA-256: f8c6db3f1d4fb6ec3a802b1234d750207549414d9ac98c5c98584d3efb8f6391
kernel-debug-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: f33851540292c1731cfd0ed3dfa5908dbcca148d1521628972e6bb3c65680fde
kernel-debug-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: ebf1d45bd3819e31d14045af0b3e5d46531568e0a19d87a5b9c0753f62f43f4a
kernel-debug-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 965a44f05fe36e46a59fd23f2ce1a27383a492b59496d04a8a57bd75af4bf7be
kernel-debug-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: 5447e267d5f3ad0ddd7d0a773d34aa54cd26aafec552070ac4028ed7cc969e1a
kernel-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: c75ff4d747c20076add720e854c7b2dfa763115975b63e242817a108cfb0b87f
kernel-debuginfo-common-aarch64-4.18.0-305.el8.aarch64.rpm
SHA-256: 865a0e0f92327e5497ea783a9b3b4846e7512f712c5b273d7142dd9dcdf64dd8
kernel-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 59546cfa13a6bcf6a033871fba53666624188f555ab73013162359e5bfd0c3f1
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: dea461dfa3a5afa5c6b167a7e89733a45c41a7c85e6e82aa7fd8cf0cf3d55b33
kernel-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 91bd1ed4d9f2644fe6e3a4d4861ee570fa696f98e607daaec3fc6e77e3b436ab
kernel-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: c485ff2ecec75e76994250bd7e5be29a41bf8a2f03cbc26a461ddcd85a85074b
kernel-tools-4.18.0-305.el8.aarch64.rpm
SHA-256: 27357aa33111fe063f5c69b150db6407fd288110fab188dd1a12f2a309fcffff
kernel-tools-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 2a04a9d3681e53bc03fd35424931f9873786b094ab445135dcb676d0b36b4954
kernel-tools-libs-4.18.0-305.el8.aarch64.rpm
SHA-256: 29272ccaa53985d3f0342a094a80a41bf2da4cf440dd178fe8087156af67beda
perf-4.18.0-305.el8.aarch64.rpm
SHA-256: 3e39da68c43578e1a270126fc9434ccd714d186a1685ac3eed8d6ae82c5e9668
perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1b955cdc95f09ba146a5cdfd3b9922d0bd05456d8a5ab6aa7324943d49282683
python3-perf-4.18.0-305.el8.aarch64.rpm
SHA-256: c1a66a526e181a96eeb2a3c887478828e9aa5d0bfb769bc95c80d49ec703858b
python3-perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 23071018bda00b2350bf0ecfc00d00cff2112d0a2fadb823fece089388b10843
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
ppc64le
bpftool-4.18.0-305.el8.ppc64le.rpm
SHA-256: c814ef5ab7250f1ba476fe4ef14ab02b1faae520c81e822fc70c8db037116e6a
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 96a88907ff06a91056fbd304dbe280cf92bf5ed2f34b9e5219f8f11fac8dd422
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: d9c7543375a7147a7baae37a0953b189fe9a2f047379f3be117a072520a8f3da
kernel-cross-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 463f0bcb4174586cb0624f2868a21e8d65ad6ef5c84c9c90dd856b8d32436706
kernel-debug-4.18.0-305.el8.ppc64le.rpm
SHA-256: 86a19ce84f6a8b43e7f79752de3ef0a5a0c35fdb8f91027c1b8fd9846d5b33a4
kernel-debug-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: c3ddf9c565f8f36a8cffa2cf59ca434138ab2fa56c26e1aaf02bf2227d81e6d1
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debug-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2892809f07157bcdb4f52fcf67153a0aa1d6e4ce8af22a0822749d1063b28fd3
kernel-debug-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8309f891ca221cee19f204d413da0140b43930ec7f185c6d3047b0951299b9b2
kernel-debug-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 65fb50816852b46a1cfadfc5f3929decec335ecf03fc80734bb0cb049359774b
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8a36aff8b72dd458503967ebc16c017c165db6886f133ebe0843a7c85bdfa785
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 433f373bbb2c018a02d543da543236ae924f2f900b98cd539924e61a69ca965b
kernel-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8d2e7459bb4ba2a15333021f58b01d83153a3bf0ffbbd1c3617fbe5fcd8ffe8b
kernel-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 25809862a86ea5b7b5ba9cc8387a5c6f7e5aaa88872e12e9aaa19429f6245673
kernel-tools-4.18.0-305.el8.ppc64le.rpm
SHA-256: a23a4bd88a6acd0b00f4df9ceb8f5f3be49aeecf6b5eaea378440ced2666ab3e
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-4.18.0-305.el8.ppc64le.rpm
SHA-256: d6ec566b151194c4ddecf32dc338c34ef59772b3ab2cb475db156cd431fce5ee
perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 872000819cfd23f267c1139885f5c8aa09da9e9bf0654ab040624f472be7fc80
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 1fe65b0ac9e20c30530e34e5dcfa001103ab21b0a29348c066591b44e51b91d9
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
ppc64le
bpftool-4.18.0-305.el8.ppc64le.rpm
SHA-256: c814ef5ab7250f1ba476fe4ef14ab02b1faae520c81e822fc70c8db037116e6a
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 96a88907ff06a91056fbd304dbe280cf92bf5ed2f34b9e5219f8f11fac8dd422
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: d9c7543375a7147a7baae37a0953b189fe9a2f047379f3be117a072520a8f3da
kernel-cross-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 463f0bcb4174586cb0624f2868a21e8d65ad6ef5c84c9c90dd856b8d32436706
kernel-debug-4.18.0-305.el8.ppc64le.rpm
SHA-256: 86a19ce84f6a8b43e7f79752de3ef0a5a0c35fdb8f91027c1b8fd9846d5b33a4
kernel-debug-core-4.18.0-305.el8.ppc64le.rpm
SHA-256: c3ddf9c565f8f36a8cffa2cf59ca434138ab2fa56c26e1aaf02bf2227d81e6d1
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debug-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2892809f07157bcdb4f52fcf67153a0aa1d6e4ce8af22a0822749d1063b28fd3
kernel-debug-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8309f891ca221cee19f204d413da0140b43930ec7f185c6d3047b0951299b9b2
kernel-debug-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 65fb50816852b46a1cfadfc5f3929decec335ecf03fc80734bb0cb049359774b
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8a36aff8b72dd458503967ebc16c017c165db6886f133ebe0843a7c85bdfa785
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.ppc64le.rpm
SHA-256: 433f373bbb2c018a02d543da543236ae924f2f900b98cd539924e61a69ca965b
kernel-modules-4.18.0-305.el8.ppc64le.rpm
SHA-256: 8d2e7459bb4ba2a15333021f58b01d83153a3bf0ffbbd1c3617fbe5fcd8ffe8b
kernel-modules-extra-4.18.0-305.el8.ppc64le.rpm
SHA-256: 25809862a86ea5b7b5ba9cc8387a5c6f7e5aaa88872e12e9aaa19429f6245673
kernel-tools-4.18.0-305.el8.ppc64le.rpm
SHA-256: a23a4bd88a6acd0b00f4df9ceb8f5f3be49aeecf6b5eaea378440ced2666ab3e
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-4.18.0-305.el8.ppc64le.rpm
SHA-256: d6ec566b151194c4ddecf32dc338c34ef59772b3ab2cb475db156cd431fce5ee
perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 872000819cfd23f267c1139885f5c8aa09da9e9bf0654ab040624f472be7fc80
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-4.18.0-305.el8.ppc64le.rpm
SHA-256: 1fe65b0ac9e20c30530e34e5dcfa001103ab21b0a29348c066591b44e51b91d9
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
x86_64
bpftool-4.18.0-305.el8.x86_64.rpm
SHA-256: eef60646b9f14a6c134a222d13de94c6323056c3eeef65558ab90bb3717ce931
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-4.18.0-305.el8.x86_64.rpm
SHA-256: 7262cbcf85a5db786fa1b281ab703b918c032674cf3de4764d7ffc7273d98b89
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.x86_64.rpm
SHA-256: 1e9f888533b98bcd3d8f23cc08477ede3b71b91cb0a2d742396d9675fa0210de
kernel-cross-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: a18a543fda01848b1f038f1bee7e847098a8103c2ada112552c4719ae6c15697
kernel-debug-4.18.0-305.el8.x86_64.rpm
SHA-256: fe0e85b53712fbceeb213104f784e7a7ff643e7009abc22df0577cfcfde3b313
kernel-debug-core-4.18.0-305.el8.x86_64.rpm
SHA-256: b907bb5c2d9f1baa8d740c4f77053234eb0f989664f975822191d9512db775ef
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debug-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 4590a59514c61ea59e4ec0f2ddc5ed22f63e6918965e5e065a9840267d6cc233
kernel-debug-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 525c7bebf09899294cba6cdb9d6a0639482e744671a78f95a02ba73cadef4302
kernel-debug-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 68d9907770889dc1cb4f3979c5cd6e113533c0d35ad662a07e269fd840333718
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 28ffc3b2b69987ff79ff2f3e511f933a55eff5062acbe3589c4d63d937a5a480
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.x86_64.rpm
SHA-256: ba0097614b39bbc811115f37d5365528856c7be1a47d27c5ec5e2e38d48abdf9
kernel-modules-4.18.0-305.el8.x86_64.rpm
SHA-256: 5c16041371f0e3f3a7068efe1d7fd0ff7c83f8011b0976e11101ba153d083cf0
kernel-modules-extra-4.18.0-305.el8.x86_64.rpm
SHA-256: 44fed39b0303925678bdfed19bbeefce5ec2a7c6ac5298cc0ba276a022438ccc
kernel-tools-4.18.0-305.el8.x86_64.rpm
SHA-256: 69bb75786165d5d7df2b65a1561c3e89cfb64da6a6409a0b9cd78cb4e0917140
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-4.18.0-305.el8.x86_64.rpm
SHA-256: 8b2a8804cdd9422bf028fb846342a3978e5acf7a698367165cf3116076558443
perf-4.18.0-305.el8.x86_64.rpm
SHA-256: a4ca7d979e3c2b669de736c21e07fe26c56a140e2cac81cec0cd2b05451552cc
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-4.18.0-305.el8.x86_64.rpm
SHA-256: 3f443eca3ae128dedaa8130eaa8822643ae57f602b302ac726d48fece03b4295
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 78541cb2b9f47fe4ca0f70f036a55a38d09fb6f8198919b15e3b0688a0231f3d
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2559aa95bfd764669a35f6113a2eb2bd82f14a18333756d370a436e574393ab8
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1619b0ddaa814d3bd72b458b06385f57c19b53d79b7be1b6ac819d3e337dffb1
kernel-debug-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: f33851540292c1731cfd0ed3dfa5908dbcca148d1521628972e6bb3c65680fde
kernel-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: c75ff4d747c20076add720e854c7b2dfa763115975b63e242817a108cfb0b87f
kernel-debuginfo-common-aarch64-4.18.0-305.el8.aarch64.rpm
SHA-256: 865a0e0f92327e5497ea783a9b3b4846e7512f712c5b273d7142dd9dcdf64dd8
kernel-tools-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 2a04a9d3681e53bc03fd35424931f9873786b094ab445135dcb676d0b36b4954
kernel-tools-libs-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 35fb7abe49f93bb482f4c98e7c14a4dffd6b175dc15269b3a04d282d77665292
perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1b955cdc95f09ba146a5cdfd3b9922d0bd05456d8a5ab6aa7324943d49282683
python3-perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 23071018bda00b2350bf0ecfc00d00cff2112d0a2fadb823fece089388b10843
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
aarch64
bpftool-4.18.0-305.el8.aarch64.rpm
SHA-256: 3aaa64071d6f62cd2a5bc116cac06652decb98b726b9943c32611f89af2f159a
bpftool-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1619b0ddaa814d3bd72b458b06385f57c19b53d79b7be1b6ac819d3e337dffb1
kernel-4.18.0-305.el8.aarch64.rpm
SHA-256: 1be22dd5640c99049c20869e3cf3029ce827d987e7877d58d4259d595f8a2aec
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.aarch64.rpm
SHA-256: 14dc3b337c67536a23152fb701863b96be78ae23c630b99c40e30202874c971c
kernel-cross-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: f808c48058e5d6d24dcff76f02fa137fbe98ba27c756353cbc58aa2cf10587ac
kernel-debug-4.18.0-305.el8.aarch64.rpm
SHA-256: 999ddbbf5c921b1d8344c54401056ac557fbe0f5026dceb04d10166f96883b7e
kernel-debug-core-4.18.0-305.el8.aarch64.rpm
SHA-256: f8c6db3f1d4fb6ec3a802b1234d750207549414d9ac98c5c98584d3efb8f6391
kernel-debug-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: f33851540292c1731cfd0ed3dfa5908dbcca148d1521628972e6bb3c65680fde
kernel-debug-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: ebf1d45bd3819e31d14045af0b3e5d46531568e0a19d87a5b9c0753f62f43f4a
kernel-debug-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 965a44f05fe36e46a59fd23f2ce1a27383a492b59496d04a8a57bd75af4bf7be
kernel-debug-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: 5447e267d5f3ad0ddd7d0a773d34aa54cd26aafec552070ac4028ed7cc969e1a
kernel-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: c75ff4d747c20076add720e854c7b2dfa763115975b63e242817a108cfb0b87f
kernel-debuginfo-common-aarch64-4.18.0-305.el8.aarch64.rpm
SHA-256: 865a0e0f92327e5497ea783a9b3b4846e7512f712c5b273d7142dd9dcdf64dd8
kernel-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 59546cfa13a6bcf6a033871fba53666624188f555ab73013162359e5bfd0c3f1
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: dea461dfa3a5afa5c6b167a7e89733a45c41a7c85e6e82aa7fd8cf0cf3d55b33
kernel-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 91bd1ed4d9f2644fe6e3a4d4861ee570fa696f98e607daaec3fc6e77e3b436ab
kernel-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: c485ff2ecec75e76994250bd7e5be29a41bf8a2f03cbc26a461ddcd85a85074b
kernel-tools-4.18.0-305.el8.aarch64.rpm
SHA-256: 27357aa33111fe063f5c69b150db6407fd288110fab188dd1a12f2a309fcffff
kernel-tools-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 2a04a9d3681e53bc03fd35424931f9873786b094ab445135dcb676d0b36b4954
kernel-tools-libs-4.18.0-305.el8.aarch64.rpm
SHA-256: 29272ccaa53985d3f0342a094a80a41bf2da4cf440dd178fe8087156af67beda
perf-4.18.0-305.el8.aarch64.rpm
SHA-256: 3e39da68c43578e1a270126fc9434ccd714d186a1685ac3eed8d6ae82c5e9668
perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1b955cdc95f09ba146a5cdfd3b9922d0bd05456d8a5ab6aa7324943d49282683
python3-perf-4.18.0-305.el8.aarch64.rpm
SHA-256: c1a66a526e181a96eeb2a3c887478828e9aa5d0bfb769bc95c80d49ec703858b
python3-perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 23071018bda00b2350bf0ecfc00d00cff2112d0a2fadb823fece089388b10843
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.el8.src.rpm
SHA-256: b6bc0b11ba9b3501e1625ae21022867bfe56c06b486468e220d5b8bcf789b129
aarch64
bpftool-4.18.0-305.el8.aarch64.rpm
SHA-256: 3aaa64071d6f62cd2a5bc116cac06652decb98b726b9943c32611f89af2f159a
bpftool-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1619b0ddaa814d3bd72b458b06385f57c19b53d79b7be1b6ac819d3e337dffb1
kernel-4.18.0-305.el8.aarch64.rpm
SHA-256: 1be22dd5640c99049c20869e3cf3029ce827d987e7877d58d4259d595f8a2aec
kernel-abi-stablelists-4.18.0-305.el8.noarch.rpm
SHA-256: 6b06ddeb53b361ea4e9be68997569d400569ad10574277cf58228b06e7a1ae0a
kernel-core-4.18.0-305.el8.aarch64.rpm
SHA-256: 14dc3b337c67536a23152fb701863b96be78ae23c630b99c40e30202874c971c
kernel-cross-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: f808c48058e5d6d24dcff76f02fa137fbe98ba27c756353cbc58aa2cf10587ac
kernel-debug-4.18.0-305.el8.aarch64.rpm
SHA-256: 999ddbbf5c921b1d8344c54401056ac557fbe0f5026dceb04d10166f96883b7e
kernel-debug-core-4.18.0-305.el8.aarch64.rpm
SHA-256: f8c6db3f1d4fb6ec3a802b1234d750207549414d9ac98c5c98584d3efb8f6391
kernel-debug-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: f33851540292c1731cfd0ed3dfa5908dbcca148d1521628972e6bb3c65680fde
kernel-debug-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: ebf1d45bd3819e31d14045af0b3e5d46531568e0a19d87a5b9c0753f62f43f4a
kernel-debug-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 965a44f05fe36e46a59fd23f2ce1a27383a492b59496d04a8a57bd75af4bf7be
kernel-debug-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: 5447e267d5f3ad0ddd7d0a773d34aa54cd26aafec552070ac4028ed7cc969e1a
kernel-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: c75ff4d747c20076add720e854c7b2dfa763115975b63e242817a108cfb0b87f
kernel-debuginfo-common-aarch64-4.18.0-305.el8.aarch64.rpm
SHA-256: 865a0e0f92327e5497ea783a9b3b4846e7512f712c5b273d7142dd9dcdf64dd8
kernel-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 59546cfa13a6bcf6a033871fba53666624188f555ab73013162359e5bfd0c3f1
kernel-doc-4.18.0-305.el8.noarch.rpm
SHA-256: 611a53a51a3814ab7c91101b765a2ca9957c6cb6f98e8b82645dadda398ee128
kernel-headers-4.18.0-305.el8.aarch64.rpm
SHA-256: dea461dfa3a5afa5c6b167a7e89733a45c41a7c85e6e82aa7fd8cf0cf3d55b33
kernel-modules-4.18.0-305.el8.aarch64.rpm
SHA-256: 91bd1ed4d9f2644fe6e3a4d4861ee570fa696f98e607daaec3fc6e77e3b436ab
kernel-modules-extra-4.18.0-305.el8.aarch64.rpm
SHA-256: c485ff2ecec75e76994250bd7e5be29a41bf8a2f03cbc26a461ddcd85a85074b
kernel-tools-4.18.0-305.el8.aarch64.rpm
SHA-256: 27357aa33111fe063f5c69b150db6407fd288110fab188dd1a12f2a309fcffff
kernel-tools-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 2a04a9d3681e53bc03fd35424931f9873786b094ab445135dcb676d0b36b4954
kernel-tools-libs-4.18.0-305.el8.aarch64.rpm
SHA-256: 29272ccaa53985d3f0342a094a80a41bf2da4cf440dd178fe8087156af67beda
perf-4.18.0-305.el8.aarch64.rpm
SHA-256: 3e39da68c43578e1a270126fc9434ccd714d186a1685ac3eed8d6ae82c5e9668
perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1b955cdc95f09ba146a5cdfd3b9922d0bd05456d8a5ab6aa7324943d49282683
python3-perf-4.18.0-305.el8.aarch64.rpm
SHA-256: c1a66a526e181a96eeb2a3c887478828e9aa5d0bfb769bc95c80d49ec703858b
python3-perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 23071018bda00b2350bf0ecfc00d00cff2112d0a2fadb823fece089388b10843
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: aa69bc74f0aa49ba7bb9a481a5b0338a78e88fd0295d2e84a990ff974236338a
kernel-debug-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 1198c5076d6a4ac6f90a117c72964a163b14a1e955cf8c48205892be7bd232f5
kernel-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: bae574889f9894e818beb5cff5b93a34cfcbcdd4910915dcb7847342c6427e7f
kernel-debuginfo-common-x86_64-4.18.0-305.el8.x86_64.rpm
SHA-256: 61468f61d9d10bfb0a6b13acfb3bca363b8f74fa9fdae7a75dbfbc64dad4b3bc
kernel-tools-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 6191264a0eb1ef571b85abc04457e79e7411ebb2f3992eace70359be221fbb16
kernel-tools-libs-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 78541cb2b9f47fe4ca0f70f036a55a38d09fb6f8198919b15e3b0688a0231f3d
perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: 30e1eb6162d5950dc813b0002ee053e2acebf22d3ef297ede73ed70a4f32d7ae
python3-perf-debuginfo-4.18.0-305.el8.x86_64.rpm
SHA-256: c32ba8e211a279cba4ec8692f08404919cee8072083e247764f528d6143bc80a
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
kernel-tools-libs-devel-4.18.0-305.el8.x86_64.rpm
SHA-256: 78541cb2b9f47fe4ca0f70f036a55a38d09fb6f8198919b15e3b0688a0231f3d
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 5206148654f9e1f2bd162bdea5a2a0d08bfc585b26be7e3720e1c68b68ae4309
kernel-debug-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 0055fd12e1fcb42c8e018efef432e69f0a154a2da338d765183ca06e91f8005c
kernel-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 506f1a240e2fb1c52ba12b0be958ef019bc888c5a877646ad978fb4e1b13d947
kernel-debuginfo-common-ppc64le-4.18.0-305.el8.ppc64le.rpm
SHA-256: bb218eab73813a9f0cfb3d7a02f950e6e448e6dbdd2a194c63c16847b6ea2eb1
kernel-tools-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 071bc1f5a9e26717f00be2c65c37e1b0419e6e8d16f3209d448de37c53aeb501
kernel-tools-libs-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2559aa95bfd764669a35f6113a2eb2bd82f14a18333756d370a436e574393ab8
perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: b6baf1d8c6de9dca043a4b9bce49ed49ca8b1a0efe2d870fc9ff7ad38ae1afac
python3-perf-debuginfo-4.18.0-305.el8.ppc64le.rpm
SHA-256: 24b7d066575017d22b0aff8b69755545c8b0eb4f7809041633b8ea1323313c81
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
kernel-tools-libs-devel-4.18.0-305.el8.ppc64le.rpm
SHA-256: 2559aa95bfd764669a35f6113a2eb2bd82f14a18333756d370a436e574393ab8
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1619b0ddaa814d3bd72b458b06385f57c19b53d79b7be1b6ac819d3e337dffb1
kernel-debug-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: f33851540292c1731cfd0ed3dfa5908dbcca148d1521628972e6bb3c65680fde
kernel-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: c75ff4d747c20076add720e854c7b2dfa763115975b63e242817a108cfb0b87f
kernel-debuginfo-common-aarch64-4.18.0-305.el8.aarch64.rpm
SHA-256: 865a0e0f92327e5497ea783a9b3b4846e7512f712c5b273d7142dd9dcdf64dd8
kernel-tools-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 2a04a9d3681e53bc03fd35424931f9873786b094ab445135dcb676d0b36b4954
kernel-tools-libs-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 35fb7abe49f93bb482f4c98e7c14a4dffd6b175dc15269b3a04d282d77665292
perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 1b955cdc95f09ba146a5cdfd3b9922d0bd05456d8a5ab6aa7324943d49282683
python3-perf-debuginfo-4.18.0-305.el8.aarch64.rpm
SHA-256: 23071018bda00b2350bf0ecfc00d00cff2112d0a2fadb823fece089388b10843
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
kernel-tools-libs-devel-4.18.0-305.el8.aarch64.rpm
SHA-256: 35fb7abe49f93bb482f4c98e7c14a4dffd6b175dc15269b3a04d282d77665292
Related news
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174302683
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-19523: A flaw was found in the Linux kernel’s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, ...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...
Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CV...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.