Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
  • CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
  • CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
  • CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Data
#vulnerability#linux#red_hat#buffer_overflow#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
  • kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • slub corruption during LPM of hnv interface (BZ#2081252)
  • sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)
  • Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083310)
  • kernel memory leak while freeing nested actions (BZ#2086604)
  • dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)
  • NFS processing deadlock in low memory condition (BZ#2094459)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64

Fixes

  • BZ - 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
  • BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code
  • BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  • BZ - 2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVEs

  • CVE-2020-29368
  • CVE-2022-1012
  • CVE-2022-1729
  • CVE-2022-1966
  • CVE-2022-27666

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

x86_64

bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b

bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf

kernel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96

kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230

kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26

kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e

kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52

kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9

kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922

kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214

kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909

kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7

kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864

kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634

kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1

perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307

perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4

python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

x86_64

bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b

bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf

kernel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96

kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230

kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26

kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e

kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52

kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9

kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922

kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214

kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909

kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7

kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864

kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634

kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1

perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307

perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4

python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

s390x

bpftool-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 4416b7fa273419a43b24717fe873cfcbb93ca7b2214d86c3fc082bc183c59dfc

bpftool-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 233cf088eeaf72ffadaadc3904fb7cf32d456fa64451b61261f137fb195aea98

kernel-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: b730a4943086b9b306267284369716a82bc133723513412435ec7a22cfd4d778

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 460ce619890fc8a3dbc6718ab60a3895b215971e52c35ce206bf24a43c005ec2

kernel-cross-headers-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: e2d950d94a3254153157977dc9b4e666806a73009d7c08f98fe6e30e1061f59d

kernel-debug-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 5d7f1043f2b1c479f0e95bcf8c165577e89f607e6763ce3ebeafcd5ef28f9581

kernel-debug-core-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: aa92954c73aea9487611cc20788733e8c4e17d6645c50b1f774418d226774018

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: d29dce43c4f55832ac17dfdaf223b00eea825b068789742aca04dc72f0a43dd7

kernel-debug-devel-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 18e15221984736387179bc34c89316b98ebc2499c2ae076593c1a934bcf5603f

kernel-debug-modules-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: d4d0ee3070de951517ca51a371c70cd248e8b221ed94230774b8960dcc11edab

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: a7a6212e39df765ebacd8c967f6a09a6a886eaa0d335e72a66fac72231c15dbf

kernel-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 291fc4f5271e60259a04fc3a5222e62a636fae0fae1330701caebf963e208c92

kernel-debuginfo-common-s390x-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: e9ce930a8fb024bfdc66fc7d5099f16e1d24761d0d2b9579a5da53d0fb5948f5

kernel-devel-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 7fb8035821e3a23dc34b32a738c1397b7aca3e3702630d44278f8d6f522c38f9

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: be4744b0c78c274f11235cb017a3be383ca7fe7823429a8aadd4a988d259490a

kernel-modules-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 619739225f746b13330f833e0e1903c06c9408d8a663f1d74520de28627a3180

kernel-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: e943ca3a958c8860b46416473affba6acb301603fa92597a15676a4a16edf98a

kernel-tools-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: ff16f51d93bebb3e9d6ba4dade47546ecb65cfd490785a7425edb5357671c3aa

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 4cab2c52ca29d47f4f599dcc56f2f751f6cffd042c8f775d83c879444085b8e7

kernel-zfcpdump-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 2a37ac693067245bbccdf0a614693519b17cf60010951733c0870da43ab67388

kernel-zfcpdump-core-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: ea077c4a88b679d836911d4ab26b3b6798c6b715efc74d5854568dcca3da8051

kernel-zfcpdump-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 7f2cbbe035f18411697e94eaac1bac430ae4032423c7881e9c18b819ff904038

kernel-zfcpdump-devel-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 99e3589de425fef8ed373dd22eea816d371dcefa8ba867bef042e56f26fbcfe7

kernel-zfcpdump-modules-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 9f896a15650106d73b06338be51dde9c078ca8e197219326ab08e09a7a046bcd

kernel-zfcpdump-modules-extra-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: a97022b559508bb25096de2afca17dfc94d77f72a13bd96fca9c4539506038a5

perf-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: eca1ecbfc58b20b76691c66a9425b6b404ca292def36e3ed409829749d501765

perf-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 8ee17fec58f317e02b764d2ce3eb85109d22a605ce3b8ba18ec236533d44a31e

python3-perf-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: 15bdd1a551adf537583d0ea03e66478101fc267f891e5ca48d16ab9bf22061cd

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.s390x.rpm

SHA-256: a0f96e01685ecfaa9df6efd00d415fabb972de9ed4cf7505b2bea0c28b1aed45

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

ppc64le

bpftool-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 3dd03d985e78a77abf9625b21ef333cfe7897facd13d019c11c0559dd26fb436

bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51

kernel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 6856f1814ce44e52ae58292f97ed5c8c4c62883943058f27447f166be2f86273

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: a484bb8d5e2c60db2a615b2716e7ab37eced40829d1bbfea0fa30942618adf6d

kernel-cross-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 952e6ce02c09cc061d53342bca62efc9fc8956f29debd9607075e37ee1b8af29

kernel-debug-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 05b4d652df8583816ac64273ca9fd76216a4f4dddc6d0d1eece53a0d8ad053ee

kernel-debug-core-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 5120695ec998019c2aec53fe5fb72e182814c7d50143fc8eb7890ab4ceb68bbb

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe

kernel-debug-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: d7023b7864f0154a77b5f9bd6b69c72568da4b24f30e6c433fe7e2076a240080

kernel-debug-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: c38ca56ac47f57c04467c9f29678f39dbaabb063821d6064fec703ec242bcbde

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 8f0660e26fce01f51e56ca8a88c045cd51df7db351e3f10fbe19ead41bee5dc4

kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c

kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b

kernel-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 59a23800b82ffb131c884d70ec4f7ce3266380921dfb0aefb46eda399951d370

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 8db44802990d997996f959db762afbbd12c83de14fd416cfeec95a2d6a6f3b2b

kernel-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e9b5a0cf3d34cdbdb8fab9608901d6e17563cf1fa08fbf4e3829382800ab53a0

kernel-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e8d69653cc4542b0cf936e30f7370f4d6bf088e9454211f1a17c1ec807933d6a

kernel-tools-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: beaeb600604f0bbe0d59b743f07adae5d8b65f76876716d7e57d483845676d37

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7

kernel-tools-libs-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 411b0900d9d2f89314eda4881aee8565f8a5a9f2a05526c246798f3076ae7794

perf-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 457af7f914a51b4664e0dee1893dd58c6e4cbc6299d379a605df66e717074550

perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4

python3-perf-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e7da071ee91abe058472bb1dcad96f12a3aba11245291bab96357875069d6efc

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

x86_64

bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b

bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf

kernel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96

kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230

kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26

kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e

kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52

kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9

kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922

kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214

kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909

kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7

kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864

kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634

kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1

perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307

perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4

python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

aarch64

bpftool-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 12a32ca033a885059921799e1b89e50013cc0f808ff405da7772cd7a8a6b94d0

bpftool-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: d4b7b946d08f7461110678c47971940785af60fb48c6f82cbe7b51b37fcebeca

kernel-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: d61e92ac2d6804c9b3419a23ee4cb499c1069c96cbf0147a222e665f9548883d

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: ef0652f051132e766b3c6b1aa88b90d5343a585f3c34c141edb906794b41e511

kernel-cross-headers-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 2089c85858b590e6747f5fb0b50040c9d03b49d057d51ff3c1cfd10efd839a5b

kernel-debug-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: bdaa970c1a8e445a80e9d716a20cceb11e87ac97069529fad574c8d64e495732

kernel-debug-core-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 127ef3f99591a826eef06564b41123e1c6e939e2a73b419a9ad5809b3a9e12de

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 1a3273cbad95cff5a5a8e40ee0ce6d1fa5e40e1cbaa7e32d7e384331902594d2

kernel-debug-devel-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: b56889a576e985970c6e9a7f36c5194c2c81fa66678c445b4adb078b0a46a5a7

kernel-debug-modules-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: ecdbd9b8d864f0827f8e9dfc489b7ebe387d0a7399ddd6d8c870284b10361523

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 57919747f5b70ff96246adaa76c192a65aa0977f8d33d076026cf340a958561b

kernel-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: cd5190b8b4bf9b68d43a969333304848cb438463475e924d1065f4ec101f3e63

kernel-debuginfo-common-aarch64-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 8a6dab925e6aa185d6e7a987b0e081c2d20830789f8cf3ba4ff25579c0109f54

kernel-devel-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: c417af9d3bc500f1fdd34628391c8e35650313199f2caadba2c33362e36e080b

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 78a8b3cd54a095ee35900bc5b8864f8c4fb8debfc2390191b10ac0a8c0edff4d

kernel-modules-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: ea9dff6b7c02aba1276b61d4f2d744322f1f700780293d80bebd8a60720b8c00

kernel-modules-extra-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 8678ef2fe33c07c1806bdd41b239349e2b3ac189d45d258c9d458dd50faea4e5

kernel-tools-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: f64d80de2849f9feefb317ae8d3d4096d82853660d5cb71f7d8f3468fcb9105b

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 652380200fc2ad756802526201302944c113432c8fcbfaaf880af44df68a6367

kernel-tools-libs-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 046d4fb9ec815a9ea94f210720df202837da4e9b3e3f472e445a4ba4266d40a1

perf-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 1403af7eb6d2238fd3c92d850ce6a6b2f2491e42822a8c73db3d407a16c2da4f

perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: b641b071d1d1bcf5d89aa772f4d00cddbbe4adff59283daced73afe9ce5b85c9

python3-perf-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: a2d066e5342afb9bc49b078041efe16c4aff371a60ec85e70776e7079bdcdf7c

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 0e82aaa1c1462cf1095f989fce8e8e3bb323c136e7b2cc1bf8406f145428b302

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

ppc64le

bpftool-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 3dd03d985e78a77abf9625b21ef333cfe7897facd13d019c11c0559dd26fb436

bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51

kernel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 6856f1814ce44e52ae58292f97ed5c8c4c62883943058f27447f166be2f86273

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: a484bb8d5e2c60db2a615b2716e7ab37eced40829d1bbfea0fa30942618adf6d

kernel-cross-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 952e6ce02c09cc061d53342bca62efc9fc8956f29debd9607075e37ee1b8af29

kernel-debug-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 05b4d652df8583816ac64273ca9fd76216a4f4dddc6d0d1eece53a0d8ad053ee

kernel-debug-core-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 5120695ec998019c2aec53fe5fb72e182814c7d50143fc8eb7890ab4ceb68bbb

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe

kernel-debug-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: d7023b7864f0154a77b5f9bd6b69c72568da4b24f30e6c433fe7e2076a240080

kernel-debug-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: c38ca56ac47f57c04467c9f29678f39dbaabb063821d6064fec703ec242bcbde

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 8f0660e26fce01f51e56ca8a88c045cd51df7db351e3f10fbe19ead41bee5dc4

kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c

kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b

kernel-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 59a23800b82ffb131c884d70ec4f7ce3266380921dfb0aefb46eda399951d370

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 8db44802990d997996f959db762afbbd12c83de14fd416cfeec95a2d6a6f3b2b

kernel-modules-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e9b5a0cf3d34cdbdb8fab9608901d6e17563cf1fa08fbf4e3829382800ab53a0

kernel-modules-extra-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e8d69653cc4542b0cf936e30f7370f4d6bf088e9454211f1a17c1ec807933d6a

kernel-tools-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: beaeb600604f0bbe0d59b743f07adae5d8b65f76876716d7e57d483845676d37

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7

kernel-tools-libs-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 411b0900d9d2f89314eda4881aee8565f8a5a9f2a05526c246798f3076ae7794

perf-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 457af7f914a51b4664e0dee1893dd58c6e4cbc6299d379a605df66e717074550

perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4

python3-perf-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: e7da071ee91abe058472bb1dcad96f12a3aba11245291bab96357875069d6efc

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.87.1.el8_2.src.rpm

SHA-256: 00419b6f0582cb91e98fd69bfc7f91e44788734d517bd21f519830729bcbce55

x86_64

bpftool-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 74facce40b9f9161ad51f3f2d0b7ea22744d5e5b705b5ac8ce4d98ef8468610b

bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf

kernel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 2c899f8a0ef5246847796bdd4051ffc42f1ac622c1ed2628b580d4d4b7654584

kernel-abi-whitelists-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: cd988c59c59bf05debf4dbab35ad356257fa1da0f00b6422d1263f6d0d5e5cd2

kernel-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: dcbcad381e773b6780c72436f9b6aae0ed840663918c2f02e3e30fecbc065a96

kernel-cross-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: f482a125860f6275fb6c97ca2ab7c946b0c8ad6d2e0ebd2805c89a1e79cac230

kernel-debug-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c8878addbf66e2737c0d3f2a38e48c8d9b1b25f7228a1973a4ba02e901814d26

kernel-debug-core-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 28151e78b03f71aaa058d7362baa5048572d91dcb468597f7f0ca89ce4896aaf

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e

kernel-debug-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e7f356c1f947d6ef4f5457193e17adafb82cd0d9be973b26faed6a3c40f0db52

kernel-debug-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d0130b9c0f49d64d784a4744a6552b16c16c5fa87c5a94d08c8412394026fb72

kernel-debug-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4875070d09552324ae91aa3671def27b7d5fef9234859cf64521679f165ed5c9

kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922

kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214

kernel-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: d57f1d6c18878c4d1223e41ecaaae4a9487e4d0155280caf2f9086db45baf1be

kernel-doc-4.18.0-193.87.1.el8_2.noarch.rpm

SHA-256: 9d17c266f1071e4c4848aaf0cfde8cc4426e75884cc75a6e4024670b0522c799

kernel-headers-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b890907bff2ff1bd5e4489e48e146fbc0a794b5694e0c2b66acda042ef71909

kernel-modules-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 351b2ca8fa263abbd115b5a240d573bd192e2a2c8486d4ef3ea8bbb0cda492b7

kernel-modules-extra-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e9011c029acfae79340fd5015468e340d6a06778fba4b76cf156967cf509864

kernel-tools-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 57bee8a86f281daf6ce6ad6d9b25478de7259405ccf3c76ea6892ae5750f6e05

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634

kernel-tools-libs-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4e1df6ec2dc02ea6bcc4584ab9aadcca8ded8e0772d77e45bc9dd5a441711fd1

perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 37a692fab72d804450984193eb64fcae56857b7e6608f20fcb32c78f6884a307

perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4

python3-perf-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 585971e9ad8dc48ca809e9526e5d5e74ae7711d03f0d9b2751f47df6cd029bf4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2

SRPM

x86_64

bpftool-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12ae8e14c159c26a2b7e974ec8e009148e90297a76c4d18e3c68a6a5c5e17fbf

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0d3b62a2c19f81f750bc9e99dea5ba8ccddddaaea4535a8dd2d7d8c372ff802e

kernel-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 0b74c44b9b89bace21542529af4e8136769c83b1dc6080b54c242a5c890f6922

kernel-debuginfo-common-x86_64-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 12d5aa065933b83c36bea3139b421e8ee344ed1bcab515f8e26177b39411a214

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: e337dc32a719a6ba0a065131e5d37cc64e8378d13abce3604a1617d87158e634

kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 78a94f579a51d0104a129c6285d86953de35925a8ae86afc908792b68bb5f1a8

perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: 4f9f0cc2b5f2815ff0669a05371948397a6866b401ffdd3d5e4099f035c671e4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.x86_64.rpm

SHA-256: c6c15b931315af98b69108cc1a9454beaa4928dd12b8bd7e426c494cb6c14ef6

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2

SRPM

ppc64le

bpftool-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: efe7e862fab64be81034fc29d2e839823aea962c2917dd77300aac6934a31a51

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 80e4310f6cf81c3fa5dd5252faa35ecb77ea126e5a1f32c74b05ad28d01e21fe

kernel-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 9ae034e955f526bf177fbae50bbfbe5b7e7efc63735464ff7d4ee533031a3f1c

kernel-debuginfo-common-ppc64le-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 1690894385bd016d95aeed8fc6b82ec8de40c0ce73014e3a5e5e19b51f7f6e8b

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 6fa967cac88e4a5dda4d81abe6ca13d336a5a304773106470793f05c7750f7d7

kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 769b56c7f5ea738469663e2df80d0ca9db3e84123de4a28275bdc44d272cf549

perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: a6927ab598de6ba1edc56379bea8398a3b3eaca3525468d3f173ce690859d1c4

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.ppc64le.rpm

SHA-256: 2be6729f800595237fb2e34736de7c700b291cb28bbb10d1d4a9761808cbd79d

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2

SRPM

aarch64

bpftool-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: d4b7b946d08f7461110678c47971940785af60fb48c6f82cbe7b51b37fcebeca

kernel-debug-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 1a3273cbad95cff5a5a8e40ee0ce6d1fa5e40e1cbaa7e32d7e384331902594d2

kernel-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: cd5190b8b4bf9b68d43a969333304848cb438463475e924d1065f4ec101f3e63

kernel-debuginfo-common-aarch64-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 8a6dab925e6aa185d6e7a987b0e081c2d20830789f8cf3ba4ff25579c0109f54

kernel-tools-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 652380200fc2ad756802526201302944c113432c8fcbfaaf880af44df68a6367

kernel-tools-libs-devel-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: e73f9ccd98a6e8f4aaa8542ad68a74d2139c70554b67fab83e57cc5440423008

perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: b641b071d1d1bcf5d89aa772f4d00cddbbe4adff59283daced73afe9ce5b85c9

python3-perf-debuginfo-4.18.0-193.87.1.el8_2.aarch64.rpm

SHA-256: 0e82aaa1c1462cf1095f989fce8e8e3bb323c136e7b2cc1bf8406f145428b302

Related news

Ubuntu Security Notice USN-5684-1

Ubuntu Security Notice 5684-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6741-01

Red Hat Security Advisory 2022-6741-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

Ubuntu Security Notice USN-5639-1

Ubuntu Security Notice 5639-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5622-1

Ubuntu Security Notice 5622-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5616-1

Ubuntu Security Notice 5616-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5602-1

Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

RHSA-2022:6370: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.6.0 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_a...

Ubuntu Security Notice USN-5599-1

Ubuntu Security Notice 5599-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

RHSA-2022:6053: Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update

Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Ubuntu Security Notice USN-5560-2

Ubuntu Security Notice 5560-2 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5560-1

Ubuntu Security Notice 5560-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:5879: Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key

Red Hat Security Advisory 2022-5730-01

Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5564-01

Red Hat Security Advisory 2022-5564-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-5636-01

Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5626: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5565: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

Red Hat Security Advisory 2022-5439-01

Red Hat Security Advisory 2022-5439-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5476-01

Red Hat Security Advisory 2022-5476-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5439: Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.23

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2022-1271: gzip: arbitrary-file-write vulnerability * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2...

RHSA-2022:5249: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overf...

Red Hat Security Advisory 2022-5232-01

Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5219-01

Red Hat Security Advisory 2022-5219-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5232: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5232: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5219: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5157: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Kernel Live Patch Security Notice LSN-0087-1

Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. A local attacker could use this to cause a denial of service or execute arbitrary code.

Red Hat Security Advisory 2022-4942-01

Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5470-1

Ubuntu Security Notice 5470-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5467-1

Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5466-1

Ubuntu Security Notice 5466-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

RHSA-2022:4924: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-4829-01

Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.

RHSA-2022:4829: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

CVE-2022-27666: Invalid Bug ID

A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.

CVE-2021-0957: Android Security Bulletin—March 2022

In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550

RHSA-2021:4356: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontroll...

RHSA-2021:4140: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontr...