Headline
RHSA-2022:8973: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
- CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
- CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation
- CVE-2022-21123: hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)
- CVE-2022-21125: hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)
- CVE-2022-21166: hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
- CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed)
- CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
- CVE-2022-29900: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- CVE-2022-29901: hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)
- kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
- kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
- kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
- hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
- hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
- hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) (CVE-2022-21166)
- hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
- hw: cpu: AMD: Branch Type Confusion (non-retbleed) (CVE-2022-23825)
- hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
- hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- sched/pelt: Fix attach_entity_load_avg() corner case (BZ#2105360)
- RHEL9[fleetwood][P9]:kdump fails to capture vmcore when crash is triggered while running forkoff. (BZ#2109144)
- ISST-LTE:[P10 Everest] [5.14.0-70.9.1.el9_0.ppc64le] HPT:RHEL9.0:ecolp95: lpar crashed at __list_del_entry_valid+0x90/0x100 and LPM failed (BZ#2112823)
- [rhel9] livepatch panic: RIP: 0010:0xffffffffc0e070c4 seq_read_iter+0x124/0x4b0 (BZ#2122625)
- System crashes due to list_add double add at iwl_mvm_mac_wake_tx_queue+0x71 (BZ#2123315)
- [Dell EMC 9.0 BUG] Any process performing I/O doesn’t fail on degraded LVM RAID and IO process hangs (BZ#2126215)
- [HPEMC RHEL 9.0 REGRESSION] net, e810, ice: not enough device MSI-X vectors (BZ#2126491)
- RHEL9.0 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127874)
- Enable check-kabi (BZ#2132372)
- Add symbols to stablelist (BZ#2132373)
- Update RHEL9.1 kabi tooling (BZ#2132380)
- kABI: Prepare the MM subsystem for kABI lockdown (BZ#2133464)
- [Dell Storage 9.1 BUG] NVME command hang during storage array node reboot (BZ#2133553)
- WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134589)
- crypto/testmgr.c should not list dh, ecdh-nist-p256, ecdh-nist-p384 as .fips_allowed = 1 (BZ#2136523)
- FIPS self-tests for RSA pkcs7 signature verification (BZ#2136552)
- [ovs-tc] Bad length in dpctl/dump-flows (BZ#2137354)
- [RHEL9] s_pf0vf2: hw csum failure for mlx5 (BZ#2137355)
- kernel memory leak while freeing nested actions (BZ#2137356)
- ovs: backports from upstream (BZ#2137358)
- kernel should conform to FIPS-140-3 requirements (both parts) (BZ#2139095)
- [DELL EMC 9.0-RT BUG] System is not booting into RT Kernel with perc12. (BZ#2139214)
- Fix panic in nbd/004 test (BZ#2139535)
- Nested KVM is not working on RHEL 8.6 with hardware error 0x7 (BZ#2140141)
- [RHEL9] Practically limit “Dummy wait” workaround to old Intel systems (BZ#2142169)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 2069793 - CVE-2022-1158 kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
- BZ - 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
- BZ - 2090226 - CVE-2022-23816 CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- BZ - 2090237 - CVE-2022-21123 hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR)
- BZ - 2090240 - CVE-2022-21125 hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS)
- BZ - 2090241 - CVE-2022-21166 hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
- BZ - 2103148 - CVE-2022-29901 hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- BZ - 2103153 - CVE-2022-23825 hw: cpu: AMD: Branch Type Confusion (non-retbleed)
- BZ - 2103681 - CVE-2022-2959 kernel: watch queue race condition can lead to privilege escalation
- BZ - 2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
- BZ - 2141752 - CVE-2022-43945 kernel: nfsd buffer overflow by RPC message over TCP with garbage data
CVEs
- CVE-2022-1158
- CVE-2022-2639
- CVE-2022-2959
- CVE-2022-21123
- CVE-2022-21125
- CVE-2022-21166
- CVE-2022-23816
- CVE-2022-23825
- CVE-2022-26373
- CVE-2022-29900
- CVE-2022-29901
- CVE-2022-43945
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/solutions/6971358
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
x86_64
bpftool-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 8ae64d681ce965eaf63256c81133bed16ac3c57edcfd35b2a29f9228db036143
bpftool-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: caf427f6b37c7b24ca1a667a0e8193cf4d9ca0e85d656c5e6f34019a9f84a5b5
bpftool-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: caf427f6b37c7b24ca1a667a0e8193cf4d9ca0e85d656c5e6f34019a9f84a5b5
kernel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 100736b3900c6e7ffa5c2b257f5544af49e301383350301c0f734399d895b953
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: dd5f6c637051da6e047c3504a0ab8966310541cccc325bd5e9ba04a4334f8a03
kernel-debug-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 61c3f59db2edbc343b4bd69fa9179d622d4b085c5f4e59b6740aa8dfc4a8ebbb
kernel-debug-core-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 1fd64fda2c0fafb5282ec5396e0af9cc124df62c76b4b2fb68e9662d8e5d2212
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 0b1e81d541fb499147253aea2bd0d8a8f5201b077420166d0243bd90490f8412
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 0b1e81d541fb499147253aea2bd0d8a8f5201b077420166d0243bd90490f8412
kernel-debug-devel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 4999fcdfb68b887a3b85c44f0d4b3f1abdd613da281606160c7f99fce6f30f69
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 3cf0a15e0123dd26b1612564afd82d6b068aa120d743b1856ddfc5e06e8d0c3f
kernel-debug-modules-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 4bfd6e36522106c2983a41f3545a0fa5097e86b850a343f3839fffa4dfe2ae07
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: ae8e23bc9172b4e5fae8becfc7ea92f09b6c42839f6c5d0a3d3487a6fc08d226
kernel-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 896dd3098f9a3087e9bd660c6a5e9db2e51b5f38318cef45ee1e3996f0b10221
kernel-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 896dd3098f9a3087e9bd660c6a5e9db2e51b5f38318cef45ee1e3996f0b10221
kernel-debuginfo-common-x86_64-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 11d9856f6effb37444ca6cfe36e6d4baa64b06728d294afbbddfff9eed45ff56
kernel-debuginfo-common-x86_64-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 11d9856f6effb37444ca6cfe36e6d4baa64b06728d294afbbddfff9eed45ff56
kernel-devel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 78716fa5d96a788a1c8148cb96a1f74c52c7b9aecdc0f0f3e7a8bc8b68eecb13
kernel-devel-matched-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: f8fe1b17b2262be6c7a4a2672b2e60b83a8a98e3d47264731c16675bcac598cf
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 2e5871ee5a7d32fcae102b88bfa694022f24e6c042a5f439d26bc9dd18982467
kernel-modules-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 72874ea977191093bbd037b83858496ee2326ce1bae04186e81c174360891715
kernel-modules-extra-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: e46ba31e4d1ae7101ac20b99ac7368430aa271fa34d081251daf09ad953d4469
kernel-tools-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 3d3c70b52ce40490667f22224a2953f13f4622a37bedaac44f1a7d36b06a2f3b
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: a6567dc16ff2adad45a7022b000f72c27bfca44bdc2027f1117906bd3e4447d6
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: a6567dc16ff2adad45a7022b000f72c27bfca44bdc2027f1117906bd3e4447d6
kernel-tools-libs-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 033e6fdc8423c97a16d5c9b93d29a972bb254e4a2f848ee74ae384c46b77e74f
perf-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 19b8c799f0f6b9912606b46b7e3455aa58afae84709ce1b4240949c8e2dbf929
perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: c8aa8969f1e9330f946af2fc745d7dc2e014b438aa6ca660a05846d6ae3fb04e
perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: c8aa8969f1e9330f946af2fc745d7dc2e014b438aa6ca660a05846d6ae3fb04e
python3-perf-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 941e65d6bf2550fb5d5e46574ad5f889ce38d9d4f4cdf2c396b6cfd9210c2b8a
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: d160cc49e2bbc7b56e0f69cdfcb6a889e4a742d95c38eece2edd67c3f16436ce
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: d160cc49e2bbc7b56e0f69cdfcb6a889e4a742d95c38eece2edd67c3f16436ce
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
s390x
bpftool-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: a1caf9a5ca9265b4d96161f1e9630e6038af3e7eba0280292d327c73f76872bd
bpftool-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 81354f28d881d60c758c1ad837bb7fb768bf4931c65519b9659bfb100c06b451
bpftool-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 81354f28d881d60c758c1ad837bb7fb768bf4931c65519b9659bfb100c06b451
kernel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 531699f4c55c15029e484e4a3dffa8074be8306b29cfedb5cad833b1554a266f
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: bddd857bd668b39c11614d2a01eb627e26e30ad5fdd940c768756efe7344251c
kernel-debug-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e15630a1deb37f11b7964bcefc94a759ef0bc75cda4cd7f01f983abf7a915e85
kernel-debug-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ab7543bbd6accd6075a74a9cf1dd737221db9b1d082f4fa31164bbac02e18611
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 7e12a3186eef8dba94dc56ebde6690404633e2a4146d040ca07f2f07ff4f6384
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 7e12a3186eef8dba94dc56ebde6690404633e2a4146d040ca07f2f07ff4f6384
kernel-debug-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 045827a672a157462abc5ff4de6d0d58821fc027359486f2d45716393199c890
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 63d3f85b52ef94b781de0b637faa8e9b1932fe773e627e91b9e76c6fab1232bc
kernel-debug-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 6e4d445a7fbf6662349e7f60f31e24c5bd57b683270b06253a22848c08d0ab4a
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: d1c1d10a4a4c24c4933f88411cf26bf0dfc90537169417afde22704f5981d2b5
kernel-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ad80cfc36aadc2558f266758afb21fab299c0f3bd7b5316cebcedab84ae42dd9
kernel-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ad80cfc36aadc2558f266758afb21fab299c0f3bd7b5316cebcedab84ae42dd9
kernel-debuginfo-common-s390x-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: db7b0f3cb2fecfbce87835d5d6ab9c2f68a09b8c3c3fcb8c572bee9bf944ecd2
kernel-debuginfo-common-s390x-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: db7b0f3cb2fecfbce87835d5d6ab9c2f68a09b8c3c3fcb8c572bee9bf944ecd2
kernel-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 996a6eb2aa5205b174e4deb4a0326291d2f6ecfe42b37bdfa77957f776ae6d7b
kernel-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c2aac69d3625a930925239bc316ca79b00f6e5937de6a965d2373416f2727814
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 030a6ee01b34d3779781ea70053157e3eb2e39562db8c7a1ba9e351b47162926
kernel-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 8887c4e21603b79f1a5c1d56b4110333ec8d1136049c1dd3c0617be51873cf0f
kernel-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e8274c2748e8fd58174d0e38f6c3e5d5a4e09e124b23d1349a720290549ef90c
kernel-tools-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 94adb6bbea75133d0ba180d998bfa69efc61c0b06aab0937d042c47bb2545b3b
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c9622088d822f7c3a4d9e8c64cb7872753e9e8c457203c0ceaaeeae467e4e42d
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c9622088d822f7c3a4d9e8c64cb7872753e9e8c457203c0ceaaeeae467e4e42d
kernel-zfcpdump-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 107d69134b6ffeaac152ddfa998df22c8f042832c262d6ab2980c79414b6e7ba
kernel-zfcpdump-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: f890ffec423ac7678de4f585bfbedba821e90f11d93eee49eaf8b5d998f9d070
kernel-zfcpdump-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 75b257345fde9ea1275b679ffbb46e2b6528336dcf740baf1803dc1cc084e266
kernel-zfcpdump-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 75b257345fde9ea1275b679ffbb46e2b6528336dcf740baf1803dc1cc084e266
kernel-zfcpdump-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b983303743caa54dfd9ae392bff4a46e1b163cf2be9cac81626da7f91d8d9ae7
kernel-zfcpdump-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 0ef2ce4d6846bf67313a72da4abefae2762d70d1c16fa28839fbfba2a61bb155
kernel-zfcpdump-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e6f52d4ca5b471bfa2d4210aec5bc0ac3c8d6fa2e900842a5f3eea0a511f7c81
kernel-zfcpdump-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 000439b93c521abefdc82c9ce00ea8a1098ce81cdf43187118a2f27349abccab
perf-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 2bb9fdfeb1543715c0e77da4e95556dfbcd3cf652f79a2d9e403f25aa5ddd521
perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 42d5d2e8c881e099b5306b73d5d960a3abbc6f658f72624122e3cf205c701c1f
perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 42d5d2e8c881e099b5306b73d5d960a3abbc6f658f72624122e3cf205c701c1f
python3-perf-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e918c2191e7ae7f081d1758e77ce2527d23d5f1cadf8f38fadb5b59424a722e0
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b78879916b2fb44d36b1d424ef9a9fbdb3c07daeb584673afe582e72975c28ab
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b78879916b2fb44d36b1d424ef9a9fbdb3c07daeb584673afe582e72975c28ab
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
ppc64le
bpftool-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 0d9601a6ecb34efe8ab68101b84e0572610a7383141b913922b325eca20888fa
bpftool-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e706f0699e93ffdfed11599f9533de1a515d131ef8cbed9482db041d9c624adc
bpftool-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e706f0699e93ffdfed11599f9533de1a515d131ef8cbed9482db041d9c624adc
kernel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: dcccc435d04437d8175217086c70de192f286712ca2e2f0de933acfd25e8214d
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e1d9a11d1f3e1fde8735d9783600789e2b1ac6bf6fec81d60fee136e5077648c
kernel-debug-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: d7d7fe0477c4497ce778ccb2180433711689abf20bbf742d3a0980dfb0452a57
kernel-debug-core-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c41927cf8724bbe506999b783c2ba93f846540257e391d7761a1cb0121e08cc6
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 6c49aeb8b28fc5ace3523e7873e3652ce338694cef2905dde5682e4c13a92c43
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 6c49aeb8b28fc5ace3523e7873e3652ce338694cef2905dde5682e4c13a92c43
kernel-debug-devel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 089cd76ab9fd79ff9568efaf38e20d7014bbb34812a838ee20a53a55974aa5ee
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: bcbceaa3beccc3bb8a62924c2ad4771e1d3dc93bc59b21abbb52b43646257389
kernel-debug-modules-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: babd8cd3fdf13bf63c4c1f63095289b69ca6482ce6e482e27227d53a045b8ed2
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 5796bd5329bd8e9f5dd76e0a1285d98de1d3caeaef7e4e6b81364d7a7df702be
kernel-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 8ca44d4c697d661197fc458754d151b077efc6b4d2d84507e36fc90e90d3a1a1
kernel-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 8ca44d4c697d661197fc458754d151b077efc6b4d2d84507e36fc90e90d3a1a1
kernel-debuginfo-common-ppc64le-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: df7ef67f79ab377b8d45f8e1150a1a3bbb041b1567ec4a39b4d185dfeb97024e
kernel-debuginfo-common-ppc64le-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: df7ef67f79ab377b8d45f8e1150a1a3bbb041b1567ec4a39b4d185dfeb97024e
kernel-devel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e4268d59904be85d093920e10feead90a1c8614785ea949cbb70d3a742e2f604
kernel-devel-matched-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: b8da184005bcbea1dc04f3d67f8377cba6e911e0f2b0267df6e277912382f933
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c58161d68a624e8a55d3743b9344a49a2b1c736ca198f473f9312c861a2b2e02
kernel-modules-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c4dca1c36fa1146d0c343f855fb17f7ddf14fc15155db4dda0b54bb8b08cf0bf
kernel-modules-extra-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: d76441ff7b8e6cb3031fe31e87008bfb9589c86dc769763829a7d4afd1daa68a
kernel-tools-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 01f1b7592a8f899237a23374552a5dd538075dbbdcecc65977fadb36ce447271
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 768900108ff0a22ce16afb1f5fca5621fc5d614656bdb427d17c4f52299b5f8a
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 768900108ff0a22ce16afb1f5fca5621fc5d614656bdb427d17c4f52299b5f8a
kernel-tools-libs-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 79bbb2809165921cd8e8e003e109a10ff8f443af4368aecc0565a411bf392edd
perf-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 1053c053920e8a3f1c9d0a791e1e5eb19123f3a447bfcd37a0fa21a9262a01e5
perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 9d2a7b8d7f9f5e85abe1177ed10ce905330bfcc19c3d45a3a5dbfe1e2b057439
perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 9d2a7b8d7f9f5e85abe1177ed10ce905330bfcc19c3d45a3a5dbfe1e2b057439
python3-perf-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: b979ca4cafb21feaf5c485974a7b28e669d6391fc30460a5adb7fba5f85c3ee6
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 3b2e53a6942f18aea7b3955fdc4ac1a9cdbffa12457be145d92b4d094ec04ca0
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 3b2e53a6942f18aea7b3955fdc4ac1a9cdbffa12457be145d92b4d094ec04ca0
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
aarch64
bpftool-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 1eca7f24db0864c138440d23643e9863c90e235b850e8bf03ae2434e1036c3c2
bpftool-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d395c2c3fef78aaa7d4d0b1ef60e2bc7bf0da8c80e961a9df55747ed7d5b2933
bpftool-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d395c2c3fef78aaa7d4d0b1ef60e2bc7bf0da8c80e961a9df55747ed7d5b2933
kernel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 7dcb135351224ce6f7bdb3d0a4829b202d30c89a498738db0381321691202c4e
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 44ced86c2203d2eb598e35a65acead0b048bb73ac4e84d0f93f22a6c7d55161a
kernel-debug-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 0352bae4eb463a73064787f9bcd0d2927587ac2d05b1db94a3bdb387c828aeea
kernel-debug-core-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: ef81de484d3c6a31f45b0c80aea70c5fd74b060930f2410b15e632bd318f426d
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: a705a1557949254bca2e988b471b3211a7c319d7528a6716367f27eb9a541ca8
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: a705a1557949254bca2e988b471b3211a7c319d7528a6716367f27eb9a541ca8
kernel-debug-devel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e0ef7d8aaaabc79c2aab96eb2cda69d8435b864be5a9eeb4451dadb8ee8945ed
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 5a63d1778668fb4bf4d80fb431c98af15d7dd858ec341d565e2705fd28d226b3
kernel-debug-modules-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e305be30f196333d68c19abecba494704bc1d0cd01541ef6d5bb6d6bbad926ff
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 69df85d1b0d9f909ed31fa0e5a358bd3a21b911096d8c822b79b36d558f42901
kernel-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 2f2f8d834138d9075f5c5c8c744719342d5883989feac42edcdfa02f18f38585
kernel-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 2f2f8d834138d9075f5c5c8c744719342d5883989feac42edcdfa02f18f38585
kernel-debuginfo-common-aarch64-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 813a0daf91d4956b426f31dec9ff3f6c6cb1bbdeef81c27ee7ee8a4bb1f89803
kernel-debuginfo-common-aarch64-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 813a0daf91d4956b426f31dec9ff3f6c6cb1bbdeef81c27ee7ee8a4bb1f89803
kernel-devel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 9f3fc17b7329246f313937a6bfbd1aa4c61e0cf8bdd093b65d1e124af897959c
kernel-devel-matched-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 6843bef225c5197b47da3aa5e43d2414e1d73188779b4d8228e74c6dfd5fc5e4
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: c8fb4cb83f1bddaa9382f18e2ae692cb76c0eecb77aac1cba65fc7127899e381
kernel-modules-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3606458042858e8293d627b15ed781f7a3e01955f1d1e3c716b3794b33bd8893
kernel-modules-extra-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e09e47fd71e4c7be26f6957eebdf9b6e49819af3f6d1565e6c6f5cc5324b7abd
kernel-tools-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: eb032c20d5517321f8629be1edc8a2cf5e92fcf8eee29b8874f200e3ddf79442
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d948ca6cf3808abb9a7b7efd3cdb394750d2d87f58d924ea62bb694fd30077bc
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d948ca6cf3808abb9a7b7efd3cdb394750d2d87f58d924ea62bb694fd30077bc
kernel-tools-libs-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 577aa659b2f539b485042063477132ffe014fe4c8bca7ea4fc71f853238f8075
perf-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 47bb2d2bf8a76c69ffda0f861a9f2af6d7acf04f10ddf87d61e85d952a88f973
perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 121d59b5d48adce2403f036186ad1ce1fe55c529b8c812af61705c20e17e942d
perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 121d59b5d48adce2403f036186ad1ce1fe55c529b8c812af61705c20e17e942d
python3-perf-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 9110aadf5a37eb6f2aac2664a96737664d18b6b38f3509ff445379883cd93900
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3c954408dc9a02fd3497047502f54ba8bb77678773617a32f5a343efa1d39700
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3c954408dc9a02fd3497047502f54ba8bb77678773617a32f5a343efa1d39700
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
ppc64le
bpftool-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 0d9601a6ecb34efe8ab68101b84e0572610a7383141b913922b325eca20888fa
bpftool-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e706f0699e93ffdfed11599f9533de1a515d131ef8cbed9482db041d9c624adc
bpftool-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e706f0699e93ffdfed11599f9533de1a515d131ef8cbed9482db041d9c624adc
kernel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: dcccc435d04437d8175217086c70de192f286712ca2e2f0de933acfd25e8214d
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e1d9a11d1f3e1fde8735d9783600789e2b1ac6bf6fec81d60fee136e5077648c
kernel-debug-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: d7d7fe0477c4497ce778ccb2180433711689abf20bbf742d3a0980dfb0452a57
kernel-debug-core-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c41927cf8724bbe506999b783c2ba93f846540257e391d7761a1cb0121e08cc6
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 6c49aeb8b28fc5ace3523e7873e3652ce338694cef2905dde5682e4c13a92c43
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 6c49aeb8b28fc5ace3523e7873e3652ce338694cef2905dde5682e4c13a92c43
kernel-debug-devel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 089cd76ab9fd79ff9568efaf38e20d7014bbb34812a838ee20a53a55974aa5ee
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: bcbceaa3beccc3bb8a62924c2ad4771e1d3dc93bc59b21abbb52b43646257389
kernel-debug-modules-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: babd8cd3fdf13bf63c4c1f63095289b69ca6482ce6e482e27227d53a045b8ed2
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 5796bd5329bd8e9f5dd76e0a1285d98de1d3caeaef7e4e6b81364d7a7df702be
kernel-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 8ca44d4c697d661197fc458754d151b077efc6b4d2d84507e36fc90e90d3a1a1
kernel-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 8ca44d4c697d661197fc458754d151b077efc6b4d2d84507e36fc90e90d3a1a1
kernel-debuginfo-common-ppc64le-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: df7ef67f79ab377b8d45f8e1150a1a3bbb041b1567ec4a39b4d185dfeb97024e
kernel-debuginfo-common-ppc64le-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: df7ef67f79ab377b8d45f8e1150a1a3bbb041b1567ec4a39b4d185dfeb97024e
kernel-devel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e4268d59904be85d093920e10feead90a1c8614785ea949cbb70d3a742e2f604
kernel-devel-matched-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: b8da184005bcbea1dc04f3d67f8377cba6e911e0f2b0267df6e277912382f933
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c58161d68a624e8a55d3743b9344a49a2b1c736ca198f473f9312c861a2b2e02
kernel-modules-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: c4dca1c36fa1146d0c343f855fb17f7ddf14fc15155db4dda0b54bb8b08cf0bf
kernel-modules-extra-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: d76441ff7b8e6cb3031fe31e87008bfb9589c86dc769763829a7d4afd1daa68a
kernel-tools-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 01f1b7592a8f899237a23374552a5dd538075dbbdcecc65977fadb36ce447271
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 768900108ff0a22ce16afb1f5fca5621fc5d614656bdb427d17c4f52299b5f8a
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 768900108ff0a22ce16afb1f5fca5621fc5d614656bdb427d17c4f52299b5f8a
kernel-tools-libs-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 79bbb2809165921cd8e8e003e109a10ff8f443af4368aecc0565a411bf392edd
perf-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 1053c053920e8a3f1c9d0a791e1e5eb19123f3a447bfcd37a0fa21a9262a01e5
perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 9d2a7b8d7f9f5e85abe1177ed10ce905330bfcc19c3d45a3a5dbfe1e2b057439
perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 9d2a7b8d7f9f5e85abe1177ed10ce905330bfcc19c3d45a3a5dbfe1e2b057439
python3-perf-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: b979ca4cafb21feaf5c485974a7b28e669d6391fc30460a5adb7fba5f85c3ee6
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 3b2e53a6942f18aea7b3955fdc4ac1a9cdbffa12457be145d92b4d094ec04ca0
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 3b2e53a6942f18aea7b3955fdc4ac1a9cdbffa12457be145d92b4d094ec04ca0
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
x86_64
bpftool-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 8ae64d681ce965eaf63256c81133bed16ac3c57edcfd35b2a29f9228db036143
bpftool-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: caf427f6b37c7b24ca1a667a0e8193cf4d9ca0e85d656c5e6f34019a9f84a5b5
bpftool-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: caf427f6b37c7b24ca1a667a0e8193cf4d9ca0e85d656c5e6f34019a9f84a5b5
kernel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 100736b3900c6e7ffa5c2b257f5544af49e301383350301c0f734399d895b953
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: dd5f6c637051da6e047c3504a0ab8966310541cccc325bd5e9ba04a4334f8a03
kernel-debug-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 61c3f59db2edbc343b4bd69fa9179d622d4b085c5f4e59b6740aa8dfc4a8ebbb
kernel-debug-core-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 1fd64fda2c0fafb5282ec5396e0af9cc124df62c76b4b2fb68e9662d8e5d2212
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 0b1e81d541fb499147253aea2bd0d8a8f5201b077420166d0243bd90490f8412
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 0b1e81d541fb499147253aea2bd0d8a8f5201b077420166d0243bd90490f8412
kernel-debug-devel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 4999fcdfb68b887a3b85c44f0d4b3f1abdd613da281606160c7f99fce6f30f69
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 3cf0a15e0123dd26b1612564afd82d6b068aa120d743b1856ddfc5e06e8d0c3f
kernel-debug-modules-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 4bfd6e36522106c2983a41f3545a0fa5097e86b850a343f3839fffa4dfe2ae07
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: ae8e23bc9172b4e5fae8becfc7ea92f09b6c42839f6c5d0a3d3487a6fc08d226
kernel-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 896dd3098f9a3087e9bd660c6a5e9db2e51b5f38318cef45ee1e3996f0b10221
kernel-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 896dd3098f9a3087e9bd660c6a5e9db2e51b5f38318cef45ee1e3996f0b10221
kernel-debuginfo-common-x86_64-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 11d9856f6effb37444ca6cfe36e6d4baa64b06728d294afbbddfff9eed45ff56
kernel-debuginfo-common-x86_64-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 11d9856f6effb37444ca6cfe36e6d4baa64b06728d294afbbddfff9eed45ff56
kernel-devel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 78716fa5d96a788a1c8148cb96a1f74c52c7b9aecdc0f0f3e7a8bc8b68eecb13
kernel-devel-matched-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: f8fe1b17b2262be6c7a4a2672b2e60b83a8a98e3d47264731c16675bcac598cf
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 2e5871ee5a7d32fcae102b88bfa694022f24e6c042a5f439d26bc9dd18982467
kernel-modules-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 72874ea977191093bbd037b83858496ee2326ce1bae04186e81c174360891715
kernel-modules-extra-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: e46ba31e4d1ae7101ac20b99ac7368430aa271fa34d081251daf09ad953d4469
kernel-tools-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 3d3c70b52ce40490667f22224a2953f13f4622a37bedaac44f1a7d36b06a2f3b
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: a6567dc16ff2adad45a7022b000f72c27bfca44bdc2027f1117906bd3e4447d6
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: a6567dc16ff2adad45a7022b000f72c27bfca44bdc2027f1117906bd3e4447d6
kernel-tools-libs-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 033e6fdc8423c97a16d5c9b93d29a972bb254e4a2f848ee74ae384c46b77e74f
perf-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 19b8c799f0f6b9912606b46b7e3455aa58afae84709ce1b4240949c8e2dbf929
perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: c8aa8969f1e9330f946af2fc745d7dc2e014b438aa6ca660a05846d6ae3fb04e
perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: c8aa8969f1e9330f946af2fc745d7dc2e014b438aa6ca660a05846d6ae3fb04e
python3-perf-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 941e65d6bf2550fb5d5e46574ad5f889ce38d9d4f4cdf2c396b6cfd9210c2b8a
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: d160cc49e2bbc7b56e0f69cdfcb6a889e4a742d95c38eece2edd67c3f16436ce
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: d160cc49e2bbc7b56e0f69cdfcb6a889e4a742d95c38eece2edd67c3f16436ce
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0
SRPM
x86_64
bpftool-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: caf427f6b37c7b24ca1a667a0e8193cf4d9ca0e85d656c5e6f34019a9f84a5b5
kernel-cross-headers-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: ca4da4495508bfc87bad9aad64c355db7f498ba8dad0bf799b20b3ca3bd0ca58
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 0b1e81d541fb499147253aea2bd0d8a8f5201b077420166d0243bd90490f8412
kernel-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 896dd3098f9a3087e9bd660c6a5e9db2e51b5f38318cef45ee1e3996f0b10221
kernel-debuginfo-common-x86_64-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 11d9856f6effb37444ca6cfe36e6d4baa64b06728d294afbbddfff9eed45ff56
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: a6567dc16ff2adad45a7022b000f72c27bfca44bdc2027f1117906bd3e4447d6
kernel-tools-libs-devel-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: 2fa5a6ae3c96cf7d7dab301dd1089ecefe60fadbe23cad39fb805aa1dd8b9fb1
perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: c8aa8969f1e9330f946af2fc745d7dc2e014b438aa6ca660a05846d6ae3fb04e
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.x86_64.rpm
SHA-256: d160cc49e2bbc7b56e0f69cdfcb6a889e4a742d95c38eece2edd67c3f16436ce
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0
SRPM
ppc64le
bpftool-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: e706f0699e93ffdfed11599f9533de1a515d131ef8cbed9482db041d9c624adc
kernel-cross-headers-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 780c86b746b9a83ea8cc1c079f7d4fba1485d39d879ecc46144744459097196f
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 6c49aeb8b28fc5ace3523e7873e3652ce338694cef2905dde5682e4c13a92c43
kernel-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 8ca44d4c697d661197fc458754d151b077efc6b4d2d84507e36fc90e90d3a1a1
kernel-debuginfo-common-ppc64le-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: df7ef67f79ab377b8d45f8e1150a1a3bbb041b1567ec4a39b4d185dfeb97024e
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 768900108ff0a22ce16afb1f5fca5621fc5d614656bdb427d17c4f52299b5f8a
kernel-tools-libs-devel-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: f86257ec89414812422a7af8e370cc207d03abadc793cb590969b8656247792f
perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 9d2a7b8d7f9f5e85abe1177ed10ce905330bfcc19c3d45a3a5dbfe1e2b057439
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.ppc64le.rpm
SHA-256: 3b2e53a6942f18aea7b3955fdc4ac1a9cdbffa12457be145d92b4d094ec04ca0
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0
SRPM
s390x
bpftool-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 81354f28d881d60c758c1ad837bb7fb768bf4931c65519b9659bfb100c06b451
kernel-cross-headers-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b811779082b5300ca8de2d0f284b7ef7d97bee5a301fcf97a18e691f609879cc
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 7e12a3186eef8dba94dc56ebde6690404633e2a4146d040ca07f2f07ff4f6384
kernel-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ad80cfc36aadc2558f266758afb21fab299c0f3bd7b5316cebcedab84ae42dd9
kernel-debuginfo-common-s390x-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: db7b0f3cb2fecfbce87835d5d6ab9c2f68a09b8c3c3fcb8c572bee9bf944ecd2
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c9622088d822f7c3a4d9e8c64cb7872753e9e8c457203c0ceaaeeae467e4e42d
kernel-zfcpdump-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 75b257345fde9ea1275b679ffbb46e2b6528336dcf740baf1803dc1cc084e266
perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 42d5d2e8c881e099b5306b73d5d960a3abbc6f658f72624122e3cf205c701c1f
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b78879916b2fb44d36b1d424ef9a9fbdb3c07daeb584673afe582e72975c28ab
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0
SRPM
aarch64
bpftool-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d395c2c3fef78aaa7d4d0b1ef60e2bc7bf0da8c80e961a9df55747ed7d5b2933
kernel-cross-headers-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: f7b1796d55f58e3913e2610c409d0c5fe406621c452c2182b29d1d67a9a3bab0
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: a705a1557949254bca2e988b471b3211a7c319d7528a6716367f27eb9a541ca8
kernel-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 2f2f8d834138d9075f5c5c8c744719342d5883989feac42edcdfa02f18f38585
kernel-debuginfo-common-aarch64-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 813a0daf91d4956b426f31dec9ff3f6c6cb1bbdeef81c27ee7ee8a4bb1f89803
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d948ca6cf3808abb9a7b7efd3cdb394750d2d87f58d924ea62bb694fd30077bc
kernel-tools-libs-devel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: c92bd4da55904db7556bb5e0fc0efb2aa7e8244a9b8f324a7d53a7f8431c33e4
perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 121d59b5d48adce2403f036186ad1ce1fe55c529b8c812af61705c20e17e942d
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3c954408dc9a02fd3497047502f54ba8bb77678773617a32f5a343efa1d39700
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
aarch64
bpftool-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 1eca7f24db0864c138440d23643e9863c90e235b850e8bf03ae2434e1036c3c2
bpftool-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d395c2c3fef78aaa7d4d0b1ef60e2bc7bf0da8c80e961a9df55747ed7d5b2933
bpftool-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d395c2c3fef78aaa7d4d0b1ef60e2bc7bf0da8c80e961a9df55747ed7d5b2933
kernel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 7dcb135351224ce6f7bdb3d0a4829b202d30c89a498738db0381321691202c4e
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 44ced86c2203d2eb598e35a65acead0b048bb73ac4e84d0f93f22a6c7d55161a
kernel-debug-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 0352bae4eb463a73064787f9bcd0d2927587ac2d05b1db94a3bdb387c828aeea
kernel-debug-core-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: ef81de484d3c6a31f45b0c80aea70c5fd74b060930f2410b15e632bd318f426d
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: a705a1557949254bca2e988b471b3211a7c319d7528a6716367f27eb9a541ca8
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: a705a1557949254bca2e988b471b3211a7c319d7528a6716367f27eb9a541ca8
kernel-debug-devel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e0ef7d8aaaabc79c2aab96eb2cda69d8435b864be5a9eeb4451dadb8ee8945ed
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 5a63d1778668fb4bf4d80fb431c98af15d7dd858ec341d565e2705fd28d226b3
kernel-debug-modules-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e305be30f196333d68c19abecba494704bc1d0cd01541ef6d5bb6d6bbad926ff
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 69df85d1b0d9f909ed31fa0e5a358bd3a21b911096d8c822b79b36d558f42901
kernel-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 2f2f8d834138d9075f5c5c8c744719342d5883989feac42edcdfa02f18f38585
kernel-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 2f2f8d834138d9075f5c5c8c744719342d5883989feac42edcdfa02f18f38585
kernel-debuginfo-common-aarch64-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 813a0daf91d4956b426f31dec9ff3f6c6cb1bbdeef81c27ee7ee8a4bb1f89803
kernel-debuginfo-common-aarch64-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 813a0daf91d4956b426f31dec9ff3f6c6cb1bbdeef81c27ee7ee8a4bb1f89803
kernel-devel-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 9f3fc17b7329246f313937a6bfbd1aa4c61e0cf8bdd093b65d1e124af897959c
kernel-devel-matched-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 6843bef225c5197b47da3aa5e43d2414e1d73188779b4d8228e74c6dfd5fc5e4
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: c8fb4cb83f1bddaa9382f18e2ae692cb76c0eecb77aac1cba65fc7127899e381
kernel-modules-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3606458042858e8293d627b15ed781f7a3e01955f1d1e3c716b3794b33bd8893
kernel-modules-extra-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: e09e47fd71e4c7be26f6957eebdf9b6e49819af3f6d1565e6c6f5cc5324b7abd
kernel-tools-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: eb032c20d5517321f8629be1edc8a2cf5e92fcf8eee29b8874f200e3ddf79442
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d948ca6cf3808abb9a7b7efd3cdb394750d2d87f58d924ea62bb694fd30077bc
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: d948ca6cf3808abb9a7b7efd3cdb394750d2d87f58d924ea62bb694fd30077bc
kernel-tools-libs-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 577aa659b2f539b485042063477132ffe014fe4c8bca7ea4fc71f853238f8075
perf-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 47bb2d2bf8a76c69ffda0f861a9f2af6d7acf04f10ddf87d61e85d952a88f973
perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 121d59b5d48adce2403f036186ad1ce1fe55c529b8c812af61705c20e17e942d
perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 121d59b5d48adce2403f036186ad1ce1fe55c529b8c812af61705c20e17e942d
python3-perf-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 9110aadf5a37eb6f2aac2664a96737664d18b6b38f3509ff445379883cd93900
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3c954408dc9a02fd3497047502f54ba8bb77678773617a32f5a343efa1d39700
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.aarch64.rpm
SHA-256: 3c954408dc9a02fd3497047502f54ba8bb77678773617a32f5a343efa1d39700
Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0
SRPM
kernel-5.14.0-70.36.1.el9_0.src.rpm
SHA-256: b6ede3c07586bc912625518adbb600ddab8dda66ab987a40870c27a5bb2d0e5a
s390x
bpftool-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: a1caf9a5ca9265b4d96161f1e9630e6038af3e7eba0280292d327c73f76872bd
bpftool-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 81354f28d881d60c758c1ad837bb7fb768bf4931c65519b9659bfb100c06b451
bpftool-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 81354f28d881d60c758c1ad837bb7fb768bf4931c65519b9659bfb100c06b451
kernel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 531699f4c55c15029e484e4a3dffa8074be8306b29cfedb5cad833b1554a266f
kernel-abi-stablelists-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: 1561d42e1a1e1d8657135116f65d038374999472b79e4b312c55e6cc5759b60a
kernel-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: bddd857bd668b39c11614d2a01eb627e26e30ad5fdd940c768756efe7344251c
kernel-debug-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e15630a1deb37f11b7964bcefc94a759ef0bc75cda4cd7f01f983abf7a915e85
kernel-debug-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ab7543bbd6accd6075a74a9cf1dd737221db9b1d082f4fa31164bbac02e18611
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 7e12a3186eef8dba94dc56ebde6690404633e2a4146d040ca07f2f07ff4f6384
kernel-debug-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 7e12a3186eef8dba94dc56ebde6690404633e2a4146d040ca07f2f07ff4f6384
kernel-debug-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 045827a672a157462abc5ff4de6d0d58821fc027359486f2d45716393199c890
kernel-debug-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 63d3f85b52ef94b781de0b637faa8e9b1932fe773e627e91b9e76c6fab1232bc
kernel-debug-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 6e4d445a7fbf6662349e7f60f31e24c5bd57b683270b06253a22848c08d0ab4a
kernel-debug-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: d1c1d10a4a4c24c4933f88411cf26bf0dfc90537169417afde22704f5981d2b5
kernel-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ad80cfc36aadc2558f266758afb21fab299c0f3bd7b5316cebcedab84ae42dd9
kernel-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: ad80cfc36aadc2558f266758afb21fab299c0f3bd7b5316cebcedab84ae42dd9
kernel-debuginfo-common-s390x-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: db7b0f3cb2fecfbce87835d5d6ab9c2f68a09b8c3c3fcb8c572bee9bf944ecd2
kernel-debuginfo-common-s390x-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: db7b0f3cb2fecfbce87835d5d6ab9c2f68a09b8c3c3fcb8c572bee9bf944ecd2
kernel-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 996a6eb2aa5205b174e4deb4a0326291d2f6ecfe42b37bdfa77957f776ae6d7b
kernel-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c2aac69d3625a930925239bc316ca79b00f6e5937de6a965d2373416f2727814
kernel-doc-5.14.0-70.36.1.el9_0.noarch.rpm
SHA-256: fb73a7b5819325f7d0ceac9b2065071a4808ff7568cec725c068ba2abf014c0d
kernel-headers-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 030a6ee01b34d3779781ea70053157e3eb2e39562db8c7a1ba9e351b47162926
kernel-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 8887c4e21603b79f1a5c1d56b4110333ec8d1136049c1dd3c0617be51873cf0f
kernel-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e8274c2748e8fd58174d0e38f6c3e5d5a4e09e124b23d1349a720290549ef90c
kernel-tools-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 94adb6bbea75133d0ba180d998bfa69efc61c0b06aab0937d042c47bb2545b3b
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c9622088d822f7c3a4d9e8c64cb7872753e9e8c457203c0ceaaeeae467e4e42d
kernel-tools-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: c9622088d822f7c3a4d9e8c64cb7872753e9e8c457203c0ceaaeeae467e4e42d
kernel-zfcpdump-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 107d69134b6ffeaac152ddfa998df22c8f042832c262d6ab2980c79414b6e7ba
kernel-zfcpdump-core-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: f890ffec423ac7678de4f585bfbedba821e90f11d93eee49eaf8b5d998f9d070
kernel-zfcpdump-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 75b257345fde9ea1275b679ffbb46e2b6528336dcf740baf1803dc1cc084e266
kernel-zfcpdump-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 75b257345fde9ea1275b679ffbb46e2b6528336dcf740baf1803dc1cc084e266
kernel-zfcpdump-devel-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b983303743caa54dfd9ae392bff4a46e1b163cf2be9cac81626da7f91d8d9ae7
kernel-zfcpdump-devel-matched-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 0ef2ce4d6846bf67313a72da4abefae2762d70d1c16fa28839fbfba2a61bb155
kernel-zfcpdump-modules-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e6f52d4ca5b471bfa2d4210aec5bc0ac3c8d6fa2e900842a5f3eea0a511f7c81
kernel-zfcpdump-modules-extra-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 000439b93c521abefdc82c9ce00ea8a1098ce81cdf43187118a2f27349abccab
perf-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 2bb9fdfeb1543715c0e77da4e95556dfbcd3cf652f79a2d9e403f25aa5ddd521
perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 42d5d2e8c881e099b5306b73d5d960a3abbc6f658f72624122e3cf205c701c1f
perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: 42d5d2e8c881e099b5306b73d5d960a3abbc6f658f72624122e3cf205c701c1f
python3-perf-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: e918c2191e7ae7f081d1758e77ce2527d23d5f1cadf8f38fadb5b59424a722e0
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b78879916b2fb44d36b1d424ef9a9fbdb3c07daeb584673afe582e72975c28ab
python3-perf-debuginfo-5.14.0-70.36.1.el9_0.s390x.rpm
SHA-256: b78879916b2fb44d36b1d424ef9a9fbdb3c07daeb584673afe582e72975c28ab
Related news
Gentoo Linux Security Advisory 202402-7 - Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. Versions greater than or equal to 4.16.6_pre1 are affected.
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. Called Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569), the novel methods follow the disclosure of another newly discovered security vulnerability affecting AMD's Zen 2 architecture-based processors known as
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0932-01 - Update information for Logging Subsystem 5.6.3 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
Logging Subsystem 5.4.12 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to alloc...
Ubuntu Security Notice 5918-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0854-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-43945: A buffer overflow flaw was found in the Linux kernel nfsd (...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap...
Ubuntu Security Notice 5875-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5865-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Ubuntu Security Notice 5863-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
The PowerVR GPU kernel driver maintains an "Information Page" used by its cache subsystem. This page can only be written by the GPU driver itself, but prior to DDK 1.18 however, a user-space program could write arbitrary data to the page, leading to memory corruption issues.Product: AndroidVersions: Android SoCAndroid ID: A-259967780
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...
Ubuntu Security Notice 5813-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5804-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5804-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamas Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Ubuntu Security Notice 5789-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...
Red Hat Advanced Cluster Management for Kubernetes 2.6.3 General Availability release images, which provide security updates, fix bugs, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-41912: crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements
Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.
Red Hat Security Advisory 2022-8974-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, code execution, out of bounds write, and privilege escalation vulnerabilities.
Red Hat Security Advisory 2022-8940-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Ubuntu Security Notice 5773-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2022-8831-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8831-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Ubuntu Security Notice 5755-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-8765-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8768-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5754-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2022-8673-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...
The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * CVE...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * CVE...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * CVE...
Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2022-7280-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7279-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7279-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete c...
Ubuntu Security Notice 5703-1 - Selim Enes Karaduman discovered that a race condition existed in the General notification queue implementation of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
Red Hat Security Advisory 2022-6991-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-6991-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-6983-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45485: kernel: information leak in the IPv6 implementation * CVE-2021-45486: kernel: information leak in the IPv4 implementation * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) *...
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Red Hat Security Advisory 2022-6872-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-6872-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-6872-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete clea...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete clea...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete clea...
Ubuntu Security Notice 5623-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5616-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2022-6460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2022-6460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5599-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5594-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Gentoo Linux Security Advisory 202208-23 - Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 4.15.3 are affected.
Ubuntu Security Notice 5565-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5565-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
Ubuntu Security Notice 5535-1 - Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges.
Ubuntu Security Notice 5535-1 - Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges.
Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.
Security researchers have uncovered yet another vulnerability affecting numerous older AMD and Intel microprocessors that could bypass current defenses and result in Spectre-based speculative-execution attacks. Dubbed Retbleed by ETH Zurich researchers Johannes Wikner and Kaveh Razavi, the issues are tracked as CVE-2022-29900 (AMD) and CVE-2022-29901 (Intel), with the chipmakers releasing
Security researchers have uncovered yet another vulnerability affecting numerous older AMD and Intel microprocessors that could bypass current defenses and result in Spectre-based speculative-execution attacks. Dubbed Retbleed by ETH Zurich researchers Johannes Wikner and Kaveh Razavi, the issues are tracked as CVE-2022-29900 (AMD) and CVE-2022-29901 (Intel), with the chipmakers releasing
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5485-2 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5486-1 - It was discovered that some Intel processors did not implement sufficient control flow management. A local attacker could use this to cause a denial of service. Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges.
Ubuntu Security Notice 5486-1 - It was discovered that some Intel processors did not implement sufficient control flow management. A local attacker could use this to cause a denial of service. Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges.
Ubuntu Security Notice 5485-1 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5485-1 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5416-1 - Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service.