Headline
RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
- CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
- CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
- CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
- kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
- kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
- kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
- kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- slub corruption during LPM of hnv interface (BZ#2081252)
- sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)
- Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083310)
- kernel memory leak while freeing nested actions (BZ#2086604)
- dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)
- NFS processing deadlock in low memory condition (BZ#2094459)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64
Fixes
- BZ - 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code
- BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
- BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
- BZ - 2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
CVEs
- CVE-2020-29368
- CVE-2022-1012
- CVE-2022-1729
- CVE-2022-1966
- CVE-2022-27666
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
x86_64
bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b
bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf
kernel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96
kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230
kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26
kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e
kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52
kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9
kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922
kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214
kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909
kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7
kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864
kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634
kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1
perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307
perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4
python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
x86_64
bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b
bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf
kernel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96
kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230
kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26
kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e
kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52
kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9
kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922
kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214
kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909
kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7
kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864
kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634
kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1
perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307
perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4
python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
s390x
bpftool-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 4416b7fa273419a43b24717fe873cfcbb93ca7b2214d86c3fc082bc183c59dfc
bpftool-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 233cf088eeaf72ffadaadc3904fb7cf32d456fa64451b61261f137fb195aea98
kernel-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: b730a4943086b9b306267284369716a82bc133723513412435ec7a22cfd4d778
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 460ce619890fc8a3dbc6718ab60a3895b215971e52c35ce206bf24a43c005ec2
kernel-cross-headers-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: e2d950d94a3254153157977dc9b4e666806a73009d7c08f98fe6e30e1061f59d
kernel-debug-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 5d7f1043f2b1c479f0e95bcf8c165577e89f607e6763ce3ebeafcd5ef28f9581
kernel-debug-core-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: aa92954c73aea9487611cc20788733e8c4e17d6645c50b1f774418d226774018
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: d29dce43c4f55832ac17dfdaf223b00eea825b068789742aca04dc72f0a43dd7
kernel-debug-devel-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 18e15221984736387179bc34c89316b98ebc2499c2ae076593c1a934bcf5603f
kernel-debug-modules-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: d4d0ee3070de951517ca51a371c70cd248e8b221ed94230774b8960dcc11edab
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: a7a6212e39df765ebacd8c967f6a09a6a886eaa0d335e72a66fac72231c15dbf
kernel-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 291fc4f5271e60259a04fc3a5222e62a636fae0fae1330701caebf963e208c92
kernel-debuginfo-common-s390x-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: e9ce930a8fb024bfdc66fc7d5099f16e1d24761d0d2b9579a5da53d0fb5948f5
kernel-devel-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 7fb8035821e3a23dc34b32a738c1397b7aca3e3702630d44278f8d6f522c38f9
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: be4744b0c78c274f11235cb017a3be383ca7fe7823429a8aadd4a988d259490a
kernel-modules-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 619739225f746b13330f833e0e1903c06c9408d8a663f1d74520de28627a3180
kernel-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: e943ca3a958c8860b46416473affba6acb301603fa92597a15676a4a16edf98a
kernel-tools-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: ff16f51d93bebb3e9d6ba4dade47546ecb65cfd490785a7425edb5357671c3aa
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 4cab2c52ca29d47f4f599dcc56f2f751f6cffd042c8f775d83c879444085b8e7
kernel-zfcpdump-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 2a37ac693067245bbccdf0a614693519b17cf60010951733c0870da43ab67388
kernel-zfcpdump-core-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: ea077c4a88b679d836911d4ab26b3b6798c6b715efc74d5854568dcca3da8051
kernel-zfcpdump-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 7f2cbbe035f18411697e94eaac1bac430ae4032423c7881e9c18b819ff904038
kernel-zfcpdump-devel-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 99e3589de425fef8ed373dd22eea816d371dcefa8ba867bef042e56f26fbcfe7
kernel-zfcpdump-modules-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 9f896a15650106d73b06338be51dde9c078ca8e197219326ab08e09a7a046bcd
kernel-zfcpdump-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: a97022b559508bb25096de2afca17dfc94d77f72a13bd96fca9c4539506038a5
perf-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: eca1ecbfc58b20b76691c66a9425b6b404ca292def36e3ed409829749d501765
perf-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 8ee17fec58f317e02b764d2ce3eb85109d22a605ce3b8ba18ec236533d44a31e
python3-perf-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: 15bdd1a551adf537583d0ea03e66478101fc267f891e5ca48d16ab9bf22061cd
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm
SHA-256: a0f96e01685ecfaa9df6efd00d415fabb972de9ed4cf7505b2bea0c28b1aed45
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
ppc64le
bpftool-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 3dd03d985e78a77abf9625b21ef333cfe7897facd13d019c11c0559dd26fb436
bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51
kernel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 6856f1814ce44e52ae58292f97ed5c8c4c62883943058f27447f166be2f86273
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: a484bb8d5e2c60db2a615b2716e7ab37eced40829d1bbfea0fa30942618adf6d
kernel-cross-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 952e6ce02c09cc061d53342bca62efc9fc8956f29debd9607075e37ee1b8af29
kernel-debug-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 05b4d652df8583816ac64273ca9fd76216a4f4dddc6d0d1eece53a0d8ad053ee
kernel-debug-core-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 5120695ec998019c2aec53fe5fb72e182814c7d50143fc8eb7890ab4ceb68bbb
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe
kernel-debug-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: d7023b7864f0154a77b5f9bd6b69c72568da4b24f30e6c433fe7e2076a240080
kernel-debug-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: c38ca56ac47f57c04467c9f29678f39dbaabb063821d6064fec703ec242bcbde
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 8f0660e26fce01f51e56ca8a88c045cd51df7db351e3f10fbe19ead41bee5dc4
kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c
kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b
kernel-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 59a23800b82ffb131c884d70ec4f7ce3266380921dfb0aefb46eda399951d370
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 8db44802990d997996f959db762afbbd12c83de14fd416cfeec95a2d6a6f3b2b
kernel-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e9b5a0cf3d34cdbdb8fab9608901d6e17563cf1fa08fbf4e3829382800ab53a0
kernel-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e8d69653cc4542b0cf936e30f7370f4d6bf088e9454211f1a17c1ec807933d6a
kernel-tools-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: beaeb600604f0bbe0d59b743f07adae5d8b65f76876716d7e57d483845676d37
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7
kernel-tools-libs-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 411b0900d9d2f89314eda4881aee8565f8a5a9f2a05526c246798f3076ae7794
perf-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 457af7f914a51b4664e0dee1893dd58c6e4cbc6299d379a605df66e717074550
perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4
python3-perf-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e7da071ee91abe058472bb1dcad96f12a3aba11245291bab96357875069d6efc
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
x86_64
bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b
bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf
kernel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96
kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230
kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26
kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e
kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52
kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9
kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922
kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214
kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909
kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7
kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864
kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634
kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1
perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307
perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4
python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
aarch64
bpftool-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 12a32ca033a885059921799e1b89e50013cc0f808ff405da7772cd7a8a6b94d0
bpftool-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: d4b7b946d08f7461110678c47971940785af60fb48c6f82cbe7b51b37fcebeca
kernel-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: d61e92ac2d6804c9b3419a23ee4cb499c1069c96cbf0147a222e665f9548883d
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: ef0652f051132e766b3c6b1aa88b90d5343a585f3c34c141edb906794b41e511
kernel-cross-headers-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 2089c85858b590e6747f5fb0b50040c9d03b49d057d51ff3c1cfd10efd839a5b
kernel-debug-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: bdaa970c1a8e445a80e9d716a20cceb11e87ac97069529fad574c8d64e495732
kernel-debug-core-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 127ef3f99591a826eef06564b41123e1c6e939e2a73b419a9ad5809b3a9e12de
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 1a3273cbad95cff5a5a8e40ee0ce6d1fa5e40e1cbaa7e32d7e384331902594d2
kernel-debug-devel-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: b56889a576e985970c6e9a7f36c5194c2c81fa66678c445b4adb078b0a46a5a7
kernel-debug-modules-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: ecdbd9b8d864f0827f8e9dfc489b7ebe387d0a7399ddd6d8c870284b10361523
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 57919747f5b70ff96246adaa76c192a65aa0977f8d33d076026cf340a958561b
kernel-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: cd5190b8b4bf9b68d43a969333304848cb438463475e924d1065f4ec101f3e63
kernel-debuginfo-common-aarch64-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 8a6dab925e6aa185d6e7a987b0e081c2d20830789f8cf3ba4ff25579c0109f54
kernel-devel-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: c417af9d3bc500f1fdd34628391c8e35650313199f2caadba2c33362e36e080b
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 78a8b3cd54a095ee35900bc5b8864f8c4fb8debfc2390191b10ac0a8c0edff4d
kernel-modules-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: ea9dff6b7c02aba1276b61d4f2d744322f1f700780293d80bebd8a60720b8c00
kernel-modules-extra-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 8678ef2fe33c07c1806bdd41b239349e2b3ac189d45d258c9d458dd50faea4e5
kernel-tools-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: f64d80de2849f9feefb317ae8d3d4096d82853660d5cb71f7d8f3468fcb9105b
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 652380200fc2ad756802526201302944c113432c8fcbfaaf880af44df68a6367
kernel-tools-libs-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 046d4fb9ec815a9ea94f210720df202837da4e9b3e3f472e445a4ba4266d40a1
perf-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 1403af7eb6d2238fd3c92d850ce6a6b2f2491e42822a8c73db3d407a16c2da4f
perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: b641b071d1d1bcf5d89aa772f4d00cddbbe4adff59283daced73afe9ce5b85c9
python3-perf-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: a2d066e5342afb9bc49b078041efe16c4aff371a60ec85e70776e7079bdcdf7c
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 0e82aaa1c1462cf1095f989fce8e8e3bb323c136e7b2cc1bf8406f145428b302
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
ppc64le
bpftool-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 3dd03d985e78a77abf9625b21ef333cfe7897facd13d019c11c0559dd26fb436
bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51
kernel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 6856f1814ce44e52ae58292f97ed5c8c4c62883943058f27447f166be2f86273
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: a484bb8d5e2c60db2a615b2716e7ab37eced40829d1bbfea0fa30942618adf6d
kernel-cross-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 952e6ce02c09cc061d53342bca62efc9fc8956f29debd9607075e37ee1b8af29
kernel-debug-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 05b4d652df8583816ac64273ca9fd76216a4f4dddc6d0d1eece53a0d8ad053ee
kernel-debug-core-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 5120695ec998019c2aec53fe5fb72e182814c7d50143fc8eb7890ab4ceb68bbb
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe
kernel-debug-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: d7023b7864f0154a77b5f9bd6b69c72568da4b24f30e6c433fe7e2076a240080
kernel-debug-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: c38ca56ac47f57c04467c9f29678f39dbaabb063821d6064fec703ec242bcbde
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 8f0660e26fce01f51e56ca8a88c045cd51df7db351e3f10fbe19ead41bee5dc4
kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c
kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b
kernel-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 59a23800b82ffb131c884d70ec4f7ce3266380921dfb0aefb46eda399951d370
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 8db44802990d997996f959db762afbbd12c83de14fd416cfeec95a2d6a6f3b2b
kernel-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e9b5a0cf3d34cdbdb8fab9608901d6e17563cf1fa08fbf4e3829382800ab53a0
kernel-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e8d69653cc4542b0cf936e30f7370f4d6bf088e9454211f1a17c1ec807933d6a
kernel-tools-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: beaeb600604f0bbe0d59b743f07adae5d8b65f76876716d7e57d483845676d37
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7
kernel-tools-libs-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 411b0900d9d2f89314eda4881aee8565f8a5a9f2a05526c246798f3076ae7794
perf-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 457af7f914a51b4664e0dee1893dd58c6e4cbc6299d379a605df66e717074550
perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4
python3-perf-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: e7da071ee91abe058472bb1dcad96f12a3aba11245291bab96357875069d6efc
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.87.1.el8_2.src.rpm
SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55
x86_64
bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b
bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf
kernel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584
kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2
kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96
kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230
kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26
kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e
kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52
kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72
kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9
kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922
kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214
kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be
kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm
SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799
kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909
kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7
kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864
kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634
kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1
perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307
perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4
python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2
SRPM
x86_64
bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e
kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922
kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634
kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 78a94f579a51d0104a129c6285d86953de35925a8ae86afc908792b68bb5f1a8
perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm
SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2
SRPM
ppc64le
bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe
kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c
kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7
kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 769b56c7f5ea738469663e2df80d0ca9db3e84123de4a28275bdc44d272cf549
perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm
SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2
SRPM
aarch64
bpftool-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: d4b7b946d08f7461110678c47971940785af60fb48c6f82cbe7b51b37fcebeca
kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 1a3273cbad95cff5a5a8e40ee0ce6d1fa5e40e1cbaa7e32d7e384331902594d2
kernel-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: cd5190b8b4bf9b68d43a969333304848cb438463475e924d1065f4ec101f3e63
kernel-debuginfo-common-aarch64-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 8a6dab925e6aa185d6e7a987b0e081c2d20830789f8cf3ba4ff25579c0109f54
kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 652380200fc2ad756802526201302944c113432c8fcbfaaf880af44df68a6367
kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: e73f9ccd98a6e8f4aaa8542ad68a74d2139c70554b67fab83e57cc5440423008
perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: b641b071d1d1bcf5d89aa772f4d00cddbbe4adff59283daced73afe9ce5b85c9
python3-perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm
SHA-256: 0e82aaa1c1462cf1095f989fce8e8e3bb323c136e7b2cc1bf8406f145428b302
Related news
Ubuntu Security Notice 5684-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2022-6741-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
Ubuntu Security Notice 5639-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5622-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5616-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...
Ubuntu Security Notice 5599-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.
Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Ubuntu Security Notice 5560-2 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5560-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...
Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key
Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...
Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.
Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5564-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
Red Hat Security Advisory 2022-5439-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5476-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2022-1271: gzip: arbitrary-file-write vulnerability * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overf...
Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5219-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code.
Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5470-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5466-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontroll...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontr...