Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1841: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#windows#linux#red_hat#ibm#sap#ssl

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • xfs_buf deadlock between inode deletion and block allocation (aarch64) (BZ#2164266)
  • mlx5:CX6-DX: [IPsec crypto-offload, IPv6, TCP, Tunnel] tcp traffic is broken on IPsec crypto-offload over IPv6 (BZ#2165492)
  • Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166369)
  • MSFT MANA NET Patch RHEL-8: Fix accessing freed irq affinity_hint (BZ#2175252)
  • Ethernet Port Configuration Tool (EPCT) not supported with in-tree ice driver (BZ#2176866)
  • Application Performance impact on cgroup v2 (BZ#2177793)
  • In FIPS mode, kernel does not transition into error state when RCT or APT health tests fail (BZ#2181732)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

x86_64

bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31

kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b

kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791

kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8

kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0

kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701

kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3

kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87

perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

x86_64

bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31

kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b

kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791

kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8

kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0

kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701

kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3

kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87

perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

s390x

bpftool-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 68fba4ca426ad1d662d201bbf1515b58363287178735fd4f01477bc214c0fffd

bpftool-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: ddf4df3237133af77b9ce08d764905e51386d17d69449e214bb1d8391c391662

kernel-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 5e2cab697136189abca8901faaf0a28b68a5b238ce5d17b8074390e6510c6906

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 49465d303ad3d0d968e94c1f6332312c8a4b5bf4cbb926b0ec5a8a5cac39adb4

kernel-cross-headers-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 8efa801dfbe97274d915e8f226690540f169190e0972bc9da70c51acf1105ec5

kernel-debug-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 65e3bd828258344dcbc2091c2e2c095383c77338143ecf4744732cd52747b04b

kernel-debug-core-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: a6ac98abf83547cebd43149c5b4e5042436b82b8c550a6db0d25bac2e73b02b9

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: f16b3a70fa129b59678574441a5198def9f45a7df9b8526832fb2ae7bc988976

kernel-debug-devel-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 03b759a092d5ecf5645f30787814c5a1c9828c7413466b77682e05689ea71b7f

kernel-debug-modules-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: c7e2f87cf9e24e2a4dcc89a20ccb0c4155b86744cd472701ad3bd333979c03f2

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: da1c7a4d473a3d54af71ff35f3cdc6b16cfcd6b358739393f6491491b3cb33a8

kernel-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 3fab93982a12f5199fa821fc55a1f963510c1990ace2e75bc298bc7ac67caccc

kernel-debuginfo-common-s390x-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: ea48ce89a92775c2ded6ce6e1e98eb33513917633e675cc2c62ab35f104e0215

kernel-devel-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: fb1cf4d22e68cc6a03f33df59d0914ccc3246d6ccf4d1ca9bd6f7202ec020d99

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 3a3c546c27f6b4c5ccf1b689c4194d2ffd97f2bdff9dd4fda8a089661ded0dd1

kernel-modules-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 35064f535846ef47f120c9acaea1119c8ad4228d76a5a7d4ac45933b95de3e67

kernel-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: dfd7615188613424b916944b6b119bfa7b4e10492336d69856e750f962f5feb3

kernel-tools-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: e831f1ee1c1eac611cd5fd448b43153cda3db9f9a0afe17ae215cdd043d5dcb9

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 1391af9f6d309bbd757acb4923347b7815c7aa4f3ccbf8bd51445a025825129e

kernel-zfcpdump-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: e569971c28029fc456c3c632d84684fcaed2d5574e21e6e1ff5872314e66bc7d

kernel-zfcpdump-core-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 2ba0aa43a2c41f9fb82234f0858bb33149573d6d875793f2d54be62f32bed054

kernel-zfcpdump-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 12a4b6b144d631bff917a1a2a240b6d0bec043d3e309fe8e3bce3acb96562979

kernel-zfcpdump-devel-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 939fe60a9a0bbc24078e9b3eda9f236c1ccf4d152c432aa206f9b06482c33be6

kernel-zfcpdump-modules-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 8811d8ef44522b8a64edd9d5ef8e92b5fac5705a98b60a814f1b51c08eccc215

kernel-zfcpdump-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 6d836fa7518e02f75c9eaf1cfc84f1ec8ff8c95025972b6a9431dec607d9a082

perf-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 3e590f0ade1a13e7f36a6dcdfb462174c050e840a719f820ab0fa64a3b91b5a6

perf-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 22e608b01bbc403fc227da658fc8a5331ba7401546fffa573b89c18998375cf3

python3-perf-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 5f4838355419905cb230e1dce9ec34088483b70013b701d46ee1c54944a599ea

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm

SHA-256: 5633b2dac5c5b6411648a08615c738d320c2eac0fcff15bbe9e257210cdab2c4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

ppc64le

bpftool-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ee868093b3f01cb00350f220ef388e1a067088efb8cf6be027ca36a63731c307

bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f

kernel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ba148a20e69b89150c8d2d39a225b7350cd9ff1671fe7e67681ca11bfc6a1054

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 52f803d9342f9e7081a08ed39db7dde58df818c790c5423eadc179701872a662

kernel-cross-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 5f3ed8f1df9a9f0d2b2003529fc21b4e45c6aac9af76448d4c19b50a333af5d2

kernel-debug-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: d8cb942d065d74ecd6a418b661dbb13abe655eb7549712e8cb4e54ec6aee94ec

kernel-debug-core-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 769cf9209040d2bcf63b99be2c6f99c84d8485ea8601c61e09f0a022d2c16879

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228

kernel-debug-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fcc375e8c3f70a936f3332682487ab5bdd4ee89ee04750d11b1df038eec3726d

kernel-debug-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 1d6c02c29b7a2957fbe7320dfb000d0b3c3a206944109fc49c607d7f252678f0

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 270286ddb7eafea0f752deeb5257ff3ffd9a400fee3b822cd94cebc4f662018c

kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967

kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca

kernel-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fd15fe52137d253cd6a683c220ed96e534bd0e1d9aa49c9efb2e8bed732c1a67

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: e39626e53e1d26453b71e09dc91ef6364043adf036a1e9d0b345213d06aedcc6

kernel-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: b22efc9f470c70c915444e26e02bd9e876cad48010dd756007942563fb7018f8

kernel-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 5e3868113635ba062224c4667f27328b8537bdeb18455ec6eeb896cbc339e89b

kernel-tools-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ce0fb0852e4e3f91d3348748b992dc6b037031f55322b33660dc16236d8f4c9c

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40

kernel-tools-libs-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 63e7d6ba3561f795dfa1a54d48167fc60879dd5f275d59500decb91c6244ee68

perf-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 1dee82485d18ff49d7121aff60c3f30a2ea73dd740ccbd67e2f7a3e0457f8c2c

perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803

python3-perf-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 50559e44c20fdce89012c9302e6c901c549613f8072fdcc216a5ba5c6498ee72

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86

kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

x86_64

bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31

kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b

kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791

kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8

kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0

kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701

kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3

kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87

perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

aarch64

bpftool-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 44f18214e7c520e2acc6f65a25171cee68f48388f9b21b997c5b47f149fa7528

bpftool-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 49e18fe6cc171b93de014bd6cbe6c442ece82150b7bac39c8c79582055c86c43

kernel-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: aad7a08907cc4307c37d4e24dcfd700f236fa85d4d85a9117ee5898c6d425427

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 4d9e1bb1ee7c7315008fea60491a2f80a961f2b43ab637c7695cf841a6979983

kernel-cross-headers-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: d243f5e11defce8a44066e18dbf576704b071de3dcaee504dd8a14247e3a88a9

kernel-debug-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: e83a7ad16f90c6a80e6d4c2023d96024f3e72d4db579820d14a2d70b018d2a12

kernel-debug-core-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 40d1078c4d4b455f0fc48c69de7f6028e7911c21952398dfbe08cb55df80b3cc

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: e639744e4351a00df19cde418af9d3c28976c8f21361e0d8e7e4cfd5c00bfa87

kernel-debug-devel-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: e578c8df345d414f243ae633768f8d30627b66608fb4ba597dccfaffe2f52c92

kernel-debug-modules-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 7aa2a141cb4edf22b74d61f1d5174d1fc5d64ce3104cdf3c85e7958f8334a9c4

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 6c1376428b99c0ee8f61b4a222e6e9d8a9a61e529eb19b08cd7b9e42ad30fcc8

kernel-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 6d2c4bd309cce2532b95d1190139b3a0de7fed0daee6707d84b944ffc8254137

kernel-debuginfo-common-aarch64-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: ffc00f1a166b3a01f578a80c3029d874d9f7432eba5d2c12f3d07a7e8d659266

kernel-devel-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: cca14aa2fd665bec931b569f99bbdb66f361e9992199d5dbeeba6969cbdbdfbc

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 1ba8a859b94a7871e045c1a1ae8965c6b691f1c7f27dadaf47637bb5dc8a98ff

kernel-modules-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: d9bff0c36afe8dad4d83f2d7eb1963b34984628bd5669dd9f521ec20ae38b3be

kernel-modules-extra-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 4af98584e4b570c86d32afd3e712bb1ac98d80e37ef524800d2141c47906b982

kernel-tools-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 5e1c39bf04395ba7d93042aa1c5915e00068d414dc6b9758189722ab97b692e2

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 4439317aef7ae3303e385e35c6f23fc65421cdde09b3d6d29540e73b035e89de

kernel-tools-libs-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 41828fafc07c0c8b29d8493a5e56a5519a29eb418ceee05cc9e64abf282c47ca

perf-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 9b546a2ef051cbc658eb44608b47589128e357169e0fcf0a8cf80d8a9454f096

perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 456adc1c90875a3b5c91bada3db3251c42586d1686110fcf6475ac27c9408055

python3-perf-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 78a3d4ef5882949ee13c3f7b9c629664ef0a3893b8dde2595a12743fb9d4cef4

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 84a5d4daad87a02493f787884118f98afff9cdefabcbcdc54eff069c30a2e6fc

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

ppc64le

bpftool-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ee868093b3f01cb00350f220ef388e1a067088efb8cf6be027ca36a63731c307

bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f

kernel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ba148a20e69b89150c8d2d39a225b7350cd9ff1671fe7e67681ca11bfc6a1054

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 52f803d9342f9e7081a08ed39db7dde58df818c790c5423eadc179701872a662

kernel-cross-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 5f3ed8f1df9a9f0d2b2003529fc21b4e45c6aac9af76448d4c19b50a333af5d2

kernel-debug-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: d8cb942d065d74ecd6a418b661dbb13abe655eb7549712e8cb4e54ec6aee94ec

kernel-debug-core-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 769cf9209040d2bcf63b99be2c6f99c84d8485ea8601c61e09f0a022d2c16879

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228

kernel-debug-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fcc375e8c3f70a936f3332682487ab5bdd4ee89ee04750d11b1df038eec3726d

kernel-debug-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 1d6c02c29b7a2957fbe7320dfb000d0b3c3a206944109fc49c607d7f252678f0

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 270286ddb7eafea0f752deeb5257ff3ffd9a400fee3b822cd94cebc4f662018c

kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967

kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca

kernel-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fd15fe52137d253cd6a683c220ed96e534bd0e1d9aa49c9efb2e8bed732c1a67

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: e39626e53e1d26453b71e09dc91ef6364043adf036a1e9d0b345213d06aedcc6

kernel-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: b22efc9f470c70c915444e26e02bd9e876cad48010dd756007942563fb7018f8

kernel-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 5e3868113635ba062224c4667f27328b8537bdeb18455ec6eeb896cbc339e89b

kernel-tools-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: ce0fb0852e4e3f91d3348748b992dc6b037031f55322b33660dc16236d8f4c9c

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40

kernel-tools-libs-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 63e7d6ba3561f795dfa1a54d48167fc60879dd5f275d59500decb91c6244ee68

perf-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 1dee82485d18ff49d7121aff60c3f30a2ea73dd740ccbd67e2f7a3e0457f8c2c

perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803

python3-perf-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 50559e44c20fdce89012c9302e6c901c549613f8072fdcc216a5ba5c6498ee72

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.52.1.el8_6.src.rpm

SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca

x86_64

bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b

kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec

kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31

kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b

kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791

kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8

kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520

kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86

kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm

SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d

kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0

kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701

kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3

kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87

perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5

kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b

kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1

kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: bcb8ba9150e02ebc2b61b00b672d18dbb69f0d10290eea34cf2d584acdd44828

perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm

SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228

kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967

kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40

kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: a0e650a2298f62a7d356d9b1932437c375194af63c25b473bfbb80d1ce5cb3c9

perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm

SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 49e18fe6cc171b93de014bd6cbe6c442ece82150b7bac39c8c79582055c86c43

kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: e639744e4351a00df19cde418af9d3c28976c8f21361e0d8e7e4cfd5c00bfa87

kernel-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 6d2c4bd309cce2532b95d1190139b3a0de7fed0daee6707d84b944ffc8254137

kernel-debuginfo-common-aarch64-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: ffc00f1a166b3a01f578a80c3029d874d9f7432eba5d2c12f3d07a7e8d659266

kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 4439317aef7ae3303e385e35c6f23fc65421cdde09b3d6d29540e73b035e89de

kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 7b40f3016330f016c3e030f31ff32c6ebe367158d23cec9c7ec34bd08661e4b7

perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 456adc1c90875a3b5c91bada3db3251c42586d1686110fcf6475ac27c9408055

python3-perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm

SHA-256: 84a5d4daad87a02493f787884118f98afff9cdefabcbcdc54eff069c30a2e6fc

Related news

Red Hat Security Advisory 2023-4125-01

Red Hat Security Advisory 2023-4125-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, privilege escalation, and use-after-free vulnerabilities.

RHSA-2023:4146: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user...

Red Hat Security Advisory 2023-3495-01

Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.

RHSA-2023:3491: Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...

RHSA-2023:3490: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-2008: A flaw was found in the Linux kernel's ...

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-3326-01

Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:3191: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1390: A remote denial of service vu...

RHSA-2023:2736: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...

Red Hat Security Advisory 2023-2458-01

Red Hat Security Advisory 2023-2458-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.

RHSA-2023:2458: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to c...

RHSA-2023:1923: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Red Hat Security Advisory 2023-1656-01

Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.

Kernel Live Patch Security Notice LNS-0093-1

Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

Ubuntu Security Notice USN-5962-1

Ubuntu Security Notice 5962-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5940-1

Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5939-1

Ubuntu Security Notice 5939-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5934-1

Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5927-1

Ubuntu Security Notice 5927-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5913-1

Ubuntu Security Notice 5913-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Lee Jones discovered that a use-after-free vulnerability existed in the Bluetooth implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5915-1

Ubuntu Security Notice 5915-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5914-1

Ubuntu Security Notice 5914-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code.