Headline
RHSA-2023:1841: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- xfs_buf deadlock between inode deletion and block allocation (aarch64) (BZ#2164266)
- mlx5:CX6-DX: [IPsec crypto-offload, IPv6, TCP, Tunnel] tcp traffic is broken on IPsec crypto-offload over IPv6 (BZ#2165492)
- Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166369)
- MSFT MANA NET Patch RHEL-8: Fix accessing freed irq affinity_hint (BZ#2175252)
- Ethernet Port Configuration Tool (EPCT) not supported with in-tree ice driver (BZ#2176866)
- Application Performance impact on cgroup v2 (BZ#2177793)
- In FIPS mode, kernel does not transition into error state when RCT or APT health tests fail (BZ#2181732)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
x86_64
bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31
kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b
kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791
kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8
kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0
kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701
kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3
kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87
perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
x86_64
bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31
kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b
kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791
kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8
kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0
kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701
kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3
kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87
perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
s390x
bpftool-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 68fba4ca426ad1d662d201bbf1515b58363287178735fd4f01477bc214c0fffd
bpftool-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: ddf4df3237133af77b9ce08d764905e51386d17d69449e214bb1d8391c391662
kernel-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 5e2cab697136189abca8901faaf0a28b68a5b238ce5d17b8074390e6510c6906
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 49465d303ad3d0d968e94c1f6332312c8a4b5bf4cbb926b0ec5a8a5cac39adb4
kernel-cross-headers-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 8efa801dfbe97274d915e8f226690540f169190e0972bc9da70c51acf1105ec5
kernel-debug-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 65e3bd828258344dcbc2091c2e2c095383c77338143ecf4744732cd52747b04b
kernel-debug-core-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: a6ac98abf83547cebd43149c5b4e5042436b82b8c550a6db0d25bac2e73b02b9
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: f16b3a70fa129b59678574441a5198def9f45a7df9b8526832fb2ae7bc988976
kernel-debug-devel-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 03b759a092d5ecf5645f30787814c5a1c9828c7413466b77682e05689ea71b7f
kernel-debug-modules-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: c7e2f87cf9e24e2a4dcc89a20ccb0c4155b86744cd472701ad3bd333979c03f2
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: da1c7a4d473a3d54af71ff35f3cdc6b16cfcd6b358739393f6491491b3cb33a8
kernel-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 3fab93982a12f5199fa821fc55a1f963510c1990ace2e75bc298bc7ac67caccc
kernel-debuginfo-common-s390x-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: ea48ce89a92775c2ded6ce6e1e98eb33513917633e675cc2c62ab35f104e0215
kernel-devel-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: fb1cf4d22e68cc6a03f33df59d0914ccc3246d6ccf4d1ca9bd6f7202ec020d99
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 3a3c546c27f6b4c5ccf1b689c4194d2ffd97f2bdff9dd4fda8a089661ded0dd1
kernel-modules-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 35064f535846ef47f120c9acaea1119c8ad4228d76a5a7d4ac45933b95de3e67
kernel-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: dfd7615188613424b916944b6b119bfa7b4e10492336d69856e750f962f5feb3
kernel-tools-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: e831f1ee1c1eac611cd5fd448b43153cda3db9f9a0afe17ae215cdd043d5dcb9
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 1391af9f6d309bbd757acb4923347b7815c7aa4f3ccbf8bd51445a025825129e
kernel-zfcpdump-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: e569971c28029fc456c3c632d84684fcaed2d5574e21e6e1ff5872314e66bc7d
kernel-zfcpdump-core-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 2ba0aa43a2c41f9fb82234f0858bb33149573d6d875793f2d54be62f32bed054
kernel-zfcpdump-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 12a4b6b144d631bff917a1a2a240b6d0bec043d3e309fe8e3bce3acb96562979
kernel-zfcpdump-devel-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 939fe60a9a0bbc24078e9b3eda9f236c1ccf4d152c432aa206f9b06482c33be6
kernel-zfcpdump-modules-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 8811d8ef44522b8a64edd9d5ef8e92b5fac5705a98b60a814f1b51c08eccc215
kernel-zfcpdump-modules-extra-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 6d836fa7518e02f75c9eaf1cfc84f1ec8ff8c95025972b6a9431dec607d9a082
perf-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 3e590f0ade1a13e7f36a6dcdfb462174c050e840a719f820ab0fa64a3b91b5a6
perf-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 22e608b01bbc403fc227da658fc8a5331ba7401546fffa573b89c18998375cf3
python3-perf-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 5f4838355419905cb230e1dce9ec34088483b70013b701d46ee1c54944a599ea
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.s390x.rpm
SHA-256: 5633b2dac5c5b6411648a08615c738d320c2eac0fcff15bbe9e257210cdab2c4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
ppc64le
bpftool-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ee868093b3f01cb00350f220ef388e1a067088efb8cf6be027ca36a63731c307
bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f
kernel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ba148a20e69b89150c8d2d39a225b7350cd9ff1671fe7e67681ca11bfc6a1054
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 52f803d9342f9e7081a08ed39db7dde58df818c790c5423eadc179701872a662
kernel-cross-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 5f3ed8f1df9a9f0d2b2003529fc21b4e45c6aac9af76448d4c19b50a333af5d2
kernel-debug-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: d8cb942d065d74ecd6a418b661dbb13abe655eb7549712e8cb4e54ec6aee94ec
kernel-debug-core-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 769cf9209040d2bcf63b99be2c6f99c84d8485ea8601c61e09f0a022d2c16879
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228
kernel-debug-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fcc375e8c3f70a936f3332682487ab5bdd4ee89ee04750d11b1df038eec3726d
kernel-debug-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 1d6c02c29b7a2957fbe7320dfb000d0b3c3a206944109fc49c607d7f252678f0
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 270286ddb7eafea0f752deeb5257ff3ffd9a400fee3b822cd94cebc4f662018c
kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967
kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca
kernel-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fd15fe52137d253cd6a683c220ed96e534bd0e1d9aa49c9efb2e8bed732c1a67
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: e39626e53e1d26453b71e09dc91ef6364043adf036a1e9d0b345213d06aedcc6
kernel-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: b22efc9f470c70c915444e26e02bd9e876cad48010dd756007942563fb7018f8
kernel-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 5e3868113635ba062224c4667f27328b8537bdeb18455ec6eeb896cbc339e89b
kernel-tools-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ce0fb0852e4e3f91d3348748b992dc6b037031f55322b33660dc16236d8f4c9c
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40
kernel-tools-libs-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 63e7d6ba3561f795dfa1a54d48167fc60879dd5f275d59500decb91c6244ee68
perf-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 1dee82485d18ff49d7121aff60c3f30a2ea73dd740ccbd67e2f7a3e0457f8c2c
perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803
python3-perf-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 50559e44c20fdce89012c9302e6c901c549613f8072fdcc216a5ba5c6498ee72
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86
kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
x86_64
bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31
kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b
kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791
kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8
kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0
kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701
kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3
kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87
perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
aarch64
bpftool-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 44f18214e7c520e2acc6f65a25171cee68f48388f9b21b997c5b47f149fa7528
bpftool-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 49e18fe6cc171b93de014bd6cbe6c442ece82150b7bac39c8c79582055c86c43
kernel-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: aad7a08907cc4307c37d4e24dcfd700f236fa85d4d85a9117ee5898c6d425427
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 4d9e1bb1ee7c7315008fea60491a2f80a961f2b43ab637c7695cf841a6979983
kernel-cross-headers-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: d243f5e11defce8a44066e18dbf576704b071de3dcaee504dd8a14247e3a88a9
kernel-debug-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: e83a7ad16f90c6a80e6d4c2023d96024f3e72d4db579820d14a2d70b018d2a12
kernel-debug-core-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 40d1078c4d4b455f0fc48c69de7f6028e7911c21952398dfbe08cb55df80b3cc
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: e639744e4351a00df19cde418af9d3c28976c8f21361e0d8e7e4cfd5c00bfa87
kernel-debug-devel-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: e578c8df345d414f243ae633768f8d30627b66608fb4ba597dccfaffe2f52c92
kernel-debug-modules-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 7aa2a141cb4edf22b74d61f1d5174d1fc5d64ce3104cdf3c85e7958f8334a9c4
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 6c1376428b99c0ee8f61b4a222e6e9d8a9a61e529eb19b08cd7b9e42ad30fcc8
kernel-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 6d2c4bd309cce2532b95d1190139b3a0de7fed0daee6707d84b944ffc8254137
kernel-debuginfo-common-aarch64-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: ffc00f1a166b3a01f578a80c3029d874d9f7432eba5d2c12f3d07a7e8d659266
kernel-devel-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: cca14aa2fd665bec931b569f99bbdb66f361e9992199d5dbeeba6969cbdbdfbc
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 1ba8a859b94a7871e045c1a1ae8965c6b691f1c7f27dadaf47637bb5dc8a98ff
kernel-modules-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: d9bff0c36afe8dad4d83f2d7eb1963b34984628bd5669dd9f521ec20ae38b3be
kernel-modules-extra-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 4af98584e4b570c86d32afd3e712bb1ac98d80e37ef524800d2141c47906b982
kernel-tools-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 5e1c39bf04395ba7d93042aa1c5915e00068d414dc6b9758189722ab97b692e2
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 4439317aef7ae3303e385e35c6f23fc65421cdde09b3d6d29540e73b035e89de
kernel-tools-libs-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 41828fafc07c0c8b29d8493a5e56a5519a29eb418ceee05cc9e64abf282c47ca
perf-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 9b546a2ef051cbc658eb44608b47589128e357169e0fcf0a8cf80d8a9454f096
perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 456adc1c90875a3b5c91bada3db3251c42586d1686110fcf6475ac27c9408055
python3-perf-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 78a3d4ef5882949ee13c3f7b9c629664ef0a3893b8dde2595a12743fb9d4cef4
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 84a5d4daad87a02493f787884118f98afff9cdefabcbcdc54eff069c30a2e6fc
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
ppc64le
bpftool-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ee868093b3f01cb00350f220ef388e1a067088efb8cf6be027ca36a63731c307
bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f
kernel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ba148a20e69b89150c8d2d39a225b7350cd9ff1671fe7e67681ca11bfc6a1054
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 52f803d9342f9e7081a08ed39db7dde58df818c790c5423eadc179701872a662
kernel-cross-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 5f3ed8f1df9a9f0d2b2003529fc21b4e45c6aac9af76448d4c19b50a333af5d2
kernel-debug-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: d8cb942d065d74ecd6a418b661dbb13abe655eb7549712e8cb4e54ec6aee94ec
kernel-debug-core-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 769cf9209040d2bcf63b99be2c6f99c84d8485ea8601c61e09f0a022d2c16879
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228
kernel-debug-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fcc375e8c3f70a936f3332682487ab5bdd4ee89ee04750d11b1df038eec3726d
kernel-debug-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 1d6c02c29b7a2957fbe7320dfb000d0b3c3a206944109fc49c607d7f252678f0
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 270286ddb7eafea0f752deeb5257ff3ffd9a400fee3b822cd94cebc4f662018c
kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967
kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca
kernel-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fd15fe52137d253cd6a683c220ed96e534bd0e1d9aa49c9efb2e8bed732c1a67
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: e39626e53e1d26453b71e09dc91ef6364043adf036a1e9d0b345213d06aedcc6
kernel-modules-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: b22efc9f470c70c915444e26e02bd9e876cad48010dd756007942563fb7018f8
kernel-modules-extra-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 5e3868113635ba062224c4667f27328b8537bdeb18455ec6eeb896cbc339e89b
kernel-tools-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: ce0fb0852e4e3f91d3348748b992dc6b037031f55322b33660dc16236d8f4c9c
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40
kernel-tools-libs-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 63e7d6ba3561f795dfa1a54d48167fc60879dd5f275d59500decb91c6244ee68
perf-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 1dee82485d18ff49d7121aff60c3f30a2ea73dd740ccbd67e2f7a3e0457f8c2c
perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803
python3-perf-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 50559e44c20fdce89012c9302e6c901c549613f8072fdcc216a5ba5c6498ee72
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.52.1.el8_6.src.rpm
SHA-256: 1323b6989d1bb4950bf0ab8f9b4501d247eb8eb952dda493c2b560e6cfb62bca
x86_64
bpftool-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c94b6722e5c8a305fd8b5bc91160e2be389c82a31d15cb19f3497be7812d309b
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: ca74a5e47c4e2b76a0bab650f652010f8d4377a5d01bec68269d5446bf11107b
kernel-abi-stablelists-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: bd3ebfea9b82855459f0ad54248574bf1c3e6fd5993dd5a3dc25dc35c1cfbbec
kernel-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 36bdfb2a16e06175deaa3a47c2509cfade7fcc379f23a8565c599b71c8c7fc31
kernel-cross-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 051d20d1d5935e7ba4549bd4ac302769e3e9afc761ece0d85518215aa14e6e1b
kernel-debug-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9ba2cd440fc68a5444a2f1dd5f82e3e8d44a44822f43f7acd5deedf26950c791
kernel-debug-core-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: eb2042e3476ed83e0bd1db90bbfd0d54d5953b41eb4226021fc1038da32914f0
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debug-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 08ccf451c22327ca1b97c240318b4c0e829909daced53a1496357914ae3c0bb8
kernel-debug-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2ca463e6604dc355cd62652ed8bbcc0d4d44a4ff17194845f1cd632cad22b520
kernel-debug-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 9f5271fa037f2a8f4baf5005bfbdc00fcc79d66f43d0813336c82584907fe643
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: fcad48340b05b526c06e844dd13087f20bd62462a27c54924a16385fdb583f86
kernel-doc-4.18.0-372.52.1.el8_6.noarch.rpm
SHA-256: 16551c93d83fdd5d6009b99c09824c9e4c3b9643dcf71c84708100000d69660d
kernel-headers-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: db7835b983e92f337e61a768c7c5d91568d7bb70995a35523652f62546566de0
kernel-modules-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 5bfab70e40113cb95041ad6368f9f4376bbe7f510acf1b035e19c9952b2f2701
kernel-modules-extra-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 2abb49c38cfded31d782c180a30b48dad3658cb2f6eca31e4ea1a03d613657c3
kernel-tools-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bf65c06c594f84738bd8f4a56fb859bc220f5f733493fb751eaa047d972974fc
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
kernel-tools-libs-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 7ab3676db710ba3c90e701fcce5f4b83b9180615854499b9dbc6b163c1eadc87
perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 43fd8f28969cf9440c95fb998d48d1de1a7686511755976353e9de9f7f8e8232
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: aef45961dda07535139a7d107b5555ba632191338ddfb8685a630819f6e53bd0
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bc4870311bfa3ed8b459e0b52f812fd9e8258be0eaa8ef196c8994f4f501b79e
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: c7d82d90befd80f6a304f819315402ca71d14a0f75b8db2ba4d7e2646b83e5f5
kernel-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: dff8a60fdfdb8b09adeeeb000fe60498bf194ec4a54f1f34abc92c09fe55648b
kernel-debuginfo-common-x86_64-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 87c9ca1ad49248b6f962362b07a377eb498c7447971b05b80e3a799b46ffd13f
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 11659d73ae3e859d75c72329d6365a9ad2d28f5e9f3ac0718e115a827107b4b1
kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: bcb8ba9150e02ebc2b61b00b672d18dbb69f0d10290eea34cf2d584acdd44828
perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 4dd839622c03142e947530999d6b28830e8be94d1339b00127203fd903b1934d
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.x86_64.rpm
SHA-256: 3e82e154760015415414f4c0d4a33799c7dbdec56fc5dcd204042ba6bd4fd6c3
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 33ea375ece3199f018c64d5118a4a027902bdce5a3f83dc38b49e09df361c41f
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 34b037ba9a8f2e64d7dfc8f82d56c3d5396fa0cce2b5e20eea3259fed66cc228
kernel-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: fc192350addd1d025d39215101ea1343c46a2d44003206850d7056c9ae945967
kernel-debuginfo-common-ppc64le-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: d11f8a853e21ee6da3385e70d1f710e7e31039b3bc054aa34fec9e31d9d3e0ca
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: 9a4895e491612688348b9a2b532052554d4efea35258fb668fe25fe7c8b32f40
kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: a0e650a2298f62a7d356d9b1932437c375194af63c25b473bfbb80d1ce5cb3c9
perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: e2a1122d5f8df5d6ad21c7db2c967a505e404e087882bcb16c62d88c84a05803
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.ppc64le.rpm
SHA-256: f9fb3bf01021f3a77bb226dcf7e09267dfc325f4720d8b158bc7c51b9576d508
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 49e18fe6cc171b93de014bd6cbe6c442ece82150b7bac39c8c79582055c86c43
kernel-debug-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: e639744e4351a00df19cde418af9d3c28976c8f21361e0d8e7e4cfd5c00bfa87
kernel-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 6d2c4bd309cce2532b95d1190139b3a0de7fed0daee6707d84b944ffc8254137
kernel-debuginfo-common-aarch64-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: ffc00f1a166b3a01f578a80c3029d874d9f7432eba5d2c12f3d07a7e8d659266
kernel-tools-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 4439317aef7ae3303e385e35c6f23fc65421cdde09b3d6d29540e73b035e89de
kernel-tools-libs-devel-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 7b40f3016330f016c3e030f31ff32c6ebe367158d23cec9c7ec34bd08661e4b7
perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 456adc1c90875a3b5c91bada3db3251c42586d1686110fcf6475ac27c9408055
python3-perf-debuginfo-4.18.0-372.52.1.el8_6.aarch64.rpm
SHA-256: 84a5d4daad87a02493f787884118f98afff9cdefabcbcdc54eff069c30a2e6fc
Related news
Red Hat Security Advisory 2023-4125-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, privilege escalation, and use-after-free vulnerabilities.
An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user...
Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-2008: A flaw was found in the Linux kernel's ...
Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1390: A remote denial of service vu...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...
Red Hat Security Advisory 2023-2458-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to c...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
Ubuntu Security Notice 5962-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5939-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5927-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5913-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Lee Jones discovered that a use-after-free vulnerability existed in the Bluetooth implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5915-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5914-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code.