Headline
RHSA-2021:4356: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2019-14615: kernel: Intel graphics card information leak.
- CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem.
- CVE-2020-24502: kernel: Improper input validation in some Intel® Ethernet E810 Adapter drivers
- CVE-2020-24503: kernel: Insufficient access control in some Intel® Ethernet E810 Adapter drivers
- CVE-2020-24504: kernel: Uncontrolled resource consumption in some Intel® Ethernet E810 Adapter drivers
- CVE-2020-24586: kernel: Fragmentation cache not cleared on reconnection
- CVE-2020-24587: kernel: Reassembling fragments encrypted under different keys
- CVE-2020-24588: kernel: wifi frame payload being parsed incorrectly as an L2 frame
- CVE-2020-26139: kernel: Forwarding EAPOL from unauthenticated wifi client
- CVE-2020-26140: kernel: accepting plaintext data frames in protected networks
- CVE-2020-26141: kernel: not verifying TKIP MIC of fragmented frames
- CVE-2020-26143: kernel: accepting fragmented plaintext frames in protected networks
- CVE-2020-26144: kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header
- CVE-2020-26145: kernel: accepting plaintext broadcast fragments as full frames
- CVE-2020-26146: kernel: reassembling encrypted fragments with non-consecutive packet numbers
- CVE-2020-26147: kernel: reassembling mixed encrypted/plaintext fragments
- CVE-2020-27777: kernel: powerpc: RTAS calls can be used to compromise kernel integrity
- CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- CVE-2020-29660: kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free
- CVE-2020-36158: kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value
- CVE-2020-36312: kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c
- CVE-2020-36386: kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c
- CVE-2021-0129: kernel: Improper access control in BlueZ may allow information disclosure vulnerability.
- CVE-2021-3348: kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c
- CVE-2021-3489: kernel: Linux kernel eBPF RINGBUF map oversized allocation
- CVE-2021-3564: kernel: double free in bluetooth subsystem when the HCI device initialization fails
- CVE-2021-3573: kernel: use-after-free in function hci_sock_bound_ioctl()
- CVE-2021-3600: kernel: eBPF 32-bit source register truncation on div/mod
- CVE-2021-3635: kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50
- CVE-2021-3659: kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c
- CVE-2021-3679: kernel: DoS in rb_per_cpu_empty()
- CVE-2021-3732: kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files
- CVE-2021-20194: kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()
- CVE-2021-20239: kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure
- CVE-2021-23133: kernel: Race condition in sctp_destroy_sock list_del
- CVE-2021-28950: kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode
- CVE-2021-28971: kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c
- CVE-2021-29155: kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory
- CVE-2021-29646: kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c
- CVE-2021-29650: kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS
- CVE-2021-31440: kernel: local escalation of privileges in handling of eBPF programs
- CVE-2021-31829: kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory
- CVE-2021-31916: kernel: out of bounds array access in drivers/md/dm-ioctl.c
- CVE-2021-33033: kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
- CVE-2021-33200: kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier
Synopsis
Moderate: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)
- kernel: Improper input validation in some Intel® Ethernet E810 Adapter drivers (CVE-2020-24502)
- kernel: Insufficient access control in some Intel® Ethernet E810 Adapter drivers (CVE-2020-24503)
- kernel: Uncontrolled resource consumption in some Intel® Ethernet E810 Adapter drivers (CVE-2020-24504)
- kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
- kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
- kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
- kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
- kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
- kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
- kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
- kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
- kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
- kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
- kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
- kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
- kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
- kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
- kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)
- kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
- kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
- kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
- kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
- kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
- kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
- kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
- kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
- kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
- kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)
- kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)
- kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)
- kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)
- kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
- kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
- kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
- kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
- kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
- kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
- kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)
- kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)
- kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
- kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
Solution
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 1509204 - dlm: Add ability to set SO_MARK on DLM sockets
- BZ - 1793880 - Unreliable RTC synchronization (11-minute mode)
- BZ - 1816493 - [RHEL 8.3] Discard request from mkfs.xfs takes too much time on raid10
- BZ - 1900844 - CVE-2020-27777 kernel: powerpc: RTAS calls can be used to compromise kernel integrity
- BZ - 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- BZ - 1906522 - CVE-2020-29660 kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free
- BZ - 1912683 - CVE-2021-20194 kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()
- BZ - 1913348 - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value
- BZ - 1915825 - Allow falling back to genfscon labeling when the FS doesn’t support xattrs and there is a fs_use_xattr rule for it
- BZ - 1919893 - CVE-2020-0427 kernel: out-of-bounds reads in pinctrl subsystem.
- BZ - 1921958 - CVE-2021-3348 kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c
- BZ - 1923636 - CVE-2021-20239 kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure
- BZ - 1930376 - CVE-2020-24504 kernel: Uncontrolled resource consumption in some Intel® Ethernet E810 Adapter drivers
- BZ - 1930379 - CVE-2020-24502 kernel: Improper input validation in some Intel® Ethernet E810 Adapter drivers
- BZ - 1930381 - CVE-2020-24503 kernel: Insufficient access control in some Intel® Ethernet E810 Adapter drivers
- BZ - 1933527 - Files on cifs mount can get mixed contents when underlying file is removed but inode number is reused, when mounted with ‘serverino’ and 'cache=strict '
- BZ - 1939341 - CNB: net: add inline function skb_csum_is_sctp
- BZ - 1941762 - CVE-2021-28950 kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode
- BZ - 1941784 - CVE-2021-28971 kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c
- BZ - 1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c
- BZ - 1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS
- BZ - 1946965 - CVE-2021-31916 kernel: out of bounds array access in drivers/md/dm-ioctl.c
- BZ - 1948772 - CVE-2021-23133 kernel: Race condition in sctp_destroy_sock list_del
- BZ - 1951595 - CVE-2021-29155 kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory
- BZ - 1953847 - [ethtool] The `NLM_F_MULTI` should be used for `NLM_F_DUMP`
- BZ - 1954588 - RHEL kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps.
- BZ - 1957788 - CVE-2021-31829 kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory
- BZ - 1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation
- BZ - 1959642 - CVE-2020-24586 kernel: Fragmentation cache not cleared on reconnection
- BZ - 1959654 - CVE-2020-24587 kernel: Reassembling fragments encrypted under different keys
- BZ - 1959657 - CVE-2020-24588 kernel: wifi frame payload being parsed incorrectly as an L2 frame
- BZ - 1959663 - CVE-2020-26139 kernel: Forwarding EAPOL from unauthenticated wifi client
- BZ - 1960490 - CVE-2020-26140 kernel: accepting plaintext data frames in protected networks
- BZ - 1960492 - CVE-2020-26141 kernel: not verifying TKIP MIC of fragmented frames
- BZ - 1960496 - CVE-2020-26143 kernel: accepting fragmented plaintext frames in protected networks
- BZ - 1960498 - CVE-2020-26144 kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header
- BZ - 1960500 - CVE-2020-26145 kernel: accepting plaintext broadcast fragments as full frames
- BZ - 1960502 - CVE-2020-26146 kernel: reassembling encrypted fragments with non-consecutive packet numbers
- BZ - 1960504 - CVE-2020-26147 kernel: reassembling mixed encrypted/plaintext fragments
- BZ - 1960708 - please add CAP_CHECKPOINT_RESTORE to capability.h
- BZ - 1964028 - CVE-2021-31440 kernel: local escalation of privileges in handling of eBPF programs
- BZ - 1964139 - CVE-2021-3564 kernel: double free in bluetooth subsystem when the HCI device initialization fails
- BZ - 1965038 - CVE-2021-0129 kernel: Improper access control in BlueZ may allow information disclosure vulnerability.
- BZ - 1965360 - kernel: get_timespec64 does not ignore padding in compat syscalls
- BZ - 1965458 - CVE-2021-33200 kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier
- BZ - 1966578 - CVE-2021-3573 kernel: use-after-free in function hci_sock_bound_ioctl()
- BZ - 1969489 - CVE-2020-36386 kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c
- BZ - 1971101 - ceph: potential data corruption in cephfs write_begin codepath
- BZ - 1972278 - libceph: allow addrvecs with a single NONE/blank address
- BZ - 1974627 - [TIPC] kernel BUG at lib/list_debug.c:31!
- BZ - 1975182 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer [rhel-8.5.0]
- BZ - 1975949 - CVE-2021-3659 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c
- BZ - 1976679 - blk-mq: fix/improve io scheduler batching dispatch
- BZ - 1976699 - [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
- BZ - 1976946 - CVE-2021-3635 kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50
- BZ - 1976969 - XFS: followup to XFS sync to upstream v5.10 (re BZ1937116)
- BZ - 1977162 - [XDP] test program warning: libbpf: elf: skipping unrecognized data section(16) .eh_frame
- BZ - 1977422 - Missing backport of IMA boot aggregate calculation in rhel 8.4 kernel
- BZ - 1977537 - RHEL8.5: Update the kernel workqueue code to v5.12 level
- BZ - 1977850 - geneve virtual devices lack the NETIF_F_FRAGLIST feature
- BZ - 1978369 - dm writecache: sync with upstream 5.14
- BZ - 1979070 - Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?)
- BZ - 1979680 - Backport openvswitch tracepoints
- BZ - 1981954 - CVE-2021-3600 kernel: eBPF 32-bit source register truncation on div/mod
- BZ - 1986138 - Lockd invalid cast to nlm_lockowner
- BZ - 1989165 - CVE-2021-3679 kernel: DoS in rb_per_cpu_empty()
- BZ - 1989999 - ceph omnibus backport for RHEL-8.5.0
- BZ - 1991976 - block: fix New warning in nvme_setup_discard
- BZ - 1992700 - blk-mq: fix kernel panic when iterating over flush request
- BZ - 1995249 - CVE-2021-3732 kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files
- BZ - 1996854 - dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc()
CVEs
- CVE-2019-14615
- CVE-2020-0427
- CVE-2020-24502
- CVE-2020-24503
- CVE-2020-24504
- CVE-2020-24586
- CVE-2020-24587
- CVE-2020-24588
- CVE-2020-26139
- CVE-2020-26140
- CVE-2020-26141
- CVE-2020-26143
- CVE-2020-26144
- CVE-2020-26145
- CVE-2020-26146
- CVE-2020-26147
- CVE-2020-27777
- CVE-2020-29368
- CVE-2020-29660
- CVE-2020-36158
- CVE-2020-36312
- CVE-2020-36386
- CVE-2021-0129
- CVE-2021-3348
- CVE-2021-3489
- CVE-2021-3564
- CVE-2021-3573
- CVE-2021-3600
- CVE-2021-3635
- CVE-2021-3659
- CVE-2021-3679
- CVE-2021-3732
- CVE-2021-20194
- CVE-2021-20239
- CVE-2021-23133
- CVE-2021-28950
- CVE-2021-28971
- CVE-2021-29155
- CVE-2021-29646
- CVE-2021-29650
- CVE-2021-31440
- CVE-2021-31829
- CVE-2021-31916
- CVE-2021-33033
- CVE-2021-33200
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
Red Hat Enterprise Linux for x86_64 8
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
x86_64
bpftool-4.18.0-348.el8.x86_64.rpm
SHA-256: ad79902721081999ce192d5916ba7521b573277ba6f110bcca9eceafbe183745
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-4.18.0-348.el8.x86_64.rpm
SHA-256: f8db084810204ce602db25a74eb549128a91d63e5306c98f9000b3b494b4d5c7
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 124a99e9198ba6b7e6db5b05261ab441377b06237f9280ff1e2ecc1f9c066702
kernel-cross-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: 3e7248eb33c3af0adf02fb54b7acf6d3a45226da7e5958df9da5d165d970efcc
kernel-debug-4.18.0-348.el8.x86_64.rpm
SHA-256: fdf17760562f56f3bb49309391eb8ac0140100386ea87e6bb7b66d0054bfb18f
kernel-debug-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 9a68c9cef94ab91d762606668ababa79fe29d2c0bab44b633dac33aba1d02f85
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debug-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: a14f363e667ac9a0cbe0ec7467003569fab10360817d2c514777fb0e870d53e3
kernel-debug-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: d44a7d5734bea99453ae5b53ef8b9f9291b731919ad9fc70325f161b5800cc43
kernel-debug-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d73e031f9342061aa98496f5e55d2835da9feac4a7af77f46387432b23c12d8e
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: a38b78c7097b0aa92c819602ea8813f5338174cce7be87ee53deafe3a24509dd
kernel-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d25b69d0e9b93331ce683bef853f31f73574b0db1e2a17d0ec68b05fdc85efa1
kernel-tools-4.18.0-348.el8.x86_64.rpm
SHA-256: cdb553531179686a6367489ccdac56cd134b5496f3d53b5385ad1ead57d92d0c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-4.18.0-348.el8.x86_64.rpm
SHA-256: bafbced3162f0765d9904d052d5520ca4d65b9ef0a2e8f487b918b8728187f85
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-4.18.0-348.el8.x86_64.rpm
SHA-256: 918125d42b24a771488a5d3407cac1368643432139a849af88f88ec1be6822a4
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
x86_64
bpftool-4.18.0-348.el8.x86_64.rpm
SHA-256: ad79902721081999ce192d5916ba7521b573277ba6f110bcca9eceafbe183745
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-4.18.0-348.el8.x86_64.rpm
SHA-256: f8db084810204ce602db25a74eb549128a91d63e5306c98f9000b3b494b4d5c7
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 124a99e9198ba6b7e6db5b05261ab441377b06237f9280ff1e2ecc1f9c066702
kernel-cross-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: 3e7248eb33c3af0adf02fb54b7acf6d3a45226da7e5958df9da5d165d970efcc
kernel-debug-4.18.0-348.el8.x86_64.rpm
SHA-256: fdf17760562f56f3bb49309391eb8ac0140100386ea87e6bb7b66d0054bfb18f
kernel-debug-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 9a68c9cef94ab91d762606668ababa79fe29d2c0bab44b633dac33aba1d02f85
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debug-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: a14f363e667ac9a0cbe0ec7467003569fab10360817d2c514777fb0e870d53e3
kernel-debug-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: d44a7d5734bea99453ae5b53ef8b9f9291b731919ad9fc70325f161b5800cc43
kernel-debug-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d73e031f9342061aa98496f5e55d2835da9feac4a7af77f46387432b23c12d8e
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: a38b78c7097b0aa92c819602ea8813f5338174cce7be87ee53deafe3a24509dd
kernel-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d25b69d0e9b93331ce683bef853f31f73574b0db1e2a17d0ec68b05fdc85efa1
kernel-tools-4.18.0-348.el8.x86_64.rpm
SHA-256: cdb553531179686a6367489ccdac56cd134b5496f3d53b5385ad1ead57d92d0c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-4.18.0-348.el8.x86_64.rpm
SHA-256: bafbced3162f0765d9904d052d5520ca4d65b9ef0a2e8f487b918b8728187f85
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-4.18.0-348.el8.x86_64.rpm
SHA-256: 918125d42b24a771488a5d3407cac1368643432139a849af88f88ec1be6822a4
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
x86_64
bpftool-4.18.0-348.el8.x86_64.rpm
SHA-256: ad79902721081999ce192d5916ba7521b573277ba6f110bcca9eceafbe183745
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-4.18.0-348.el8.x86_64.rpm
SHA-256: f8db084810204ce602db25a74eb549128a91d63e5306c98f9000b3b494b4d5c7
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 124a99e9198ba6b7e6db5b05261ab441377b06237f9280ff1e2ecc1f9c066702
kernel-cross-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: 3e7248eb33c3af0adf02fb54b7acf6d3a45226da7e5958df9da5d165d970efcc
kernel-debug-4.18.0-348.el8.x86_64.rpm
SHA-256: fdf17760562f56f3bb49309391eb8ac0140100386ea87e6bb7b66d0054bfb18f
kernel-debug-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 9a68c9cef94ab91d762606668ababa79fe29d2c0bab44b633dac33aba1d02f85
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debug-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: a14f363e667ac9a0cbe0ec7467003569fab10360817d2c514777fb0e870d53e3
kernel-debug-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: d44a7d5734bea99453ae5b53ef8b9f9291b731919ad9fc70325f161b5800cc43
kernel-debug-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d73e031f9342061aa98496f5e55d2835da9feac4a7af77f46387432b23c12d8e
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: a38b78c7097b0aa92c819602ea8813f5338174cce7be87ee53deafe3a24509dd
kernel-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d25b69d0e9b93331ce683bef853f31f73574b0db1e2a17d0ec68b05fdc85efa1
kernel-tools-4.18.0-348.el8.x86_64.rpm
SHA-256: cdb553531179686a6367489ccdac56cd134b5496f3d53b5385ad1ead57d92d0c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-4.18.0-348.el8.x86_64.rpm
SHA-256: bafbced3162f0765d9904d052d5520ca4d65b9ef0a2e8f487b918b8728187f85
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-4.18.0-348.el8.x86_64.rpm
SHA-256: 918125d42b24a771488a5d3407cac1368643432139a849af88f88ec1be6822a4
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
s390x
bpftool-4.18.0-348.el8.s390x.rpm
SHA-256: 7bacec32008f2b17c5931858213d34c256f48595efa8e7b2fadcabb26f03a7ed
bpftool-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 8a57d6d076b1fd3692d1c466190fedf44afe2f11ed0fa36371a00002d1b0e17e
kernel-4.18.0-348.el8.s390x.rpm
SHA-256: 4fa75f21924c52939d5dceac795516af84522cf2b6926637e6ce7205c45cfa7d
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.s390x.rpm
SHA-256: 4e0384a2ee7f17c8c1e185a30281d2abc0b04af239bb507e1db26021dc46a2e4
kernel-cross-headers-4.18.0-348.el8.s390x.rpm
SHA-256: 7505baa7a2fc8092f259cb4416aa74da1fd219c1401c9e7c3d8cd17c59610a65
kernel-debug-4.18.0-348.el8.s390x.rpm
SHA-256: 6b03e545c52f19649e6c697f239889ae26db7570a293342b34070cc6f3554f76
kernel-debug-core-4.18.0-348.el8.s390x.rpm
SHA-256: 60894c3e137664f8fe7bbb5fb52b33c66b12e80715a73207e3b193a004806d54
kernel-debug-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: fe3cd1d6ab52faecec2e8990f8807f5c282bf07d3e8a9f6eb7e8b63739054f4e
kernel-debug-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 79fe8ebea6b15ef30337e4175c8c5e5b43bde9cb714a186b13ec6222758a3b17
kernel-debug-modules-4.18.0-348.el8.s390x.rpm
SHA-256: eef332b03d804cc92a7108c4d1dd71ce71d3d40cc41c457009c55fd423ffbeb3
kernel-debug-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: f195eb061d5befecdd8e07c55f428d8af44a55f3a2c93d897a8bb62e16e5a40f
kernel-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 0c6aef727c83e21ba2cf4918f64ef5168e0c25f4c9b6c0fa20b14b5cd4822976
kernel-debuginfo-common-s390x-4.18.0-348.el8.s390x.rpm
SHA-256: b9fe5da1af2a1bff3cbb699ec20fdb3832ce8720026bb45f88bd1831cb24f3ba
kernel-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 398c26ab9c703392670b569dba635737a73c22cff478a8052919349c5455b96d
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.s390x.rpm
SHA-256: a75bf8090a1a0d82cf2c4f61fa9f41ef96c87f0a4eec25020a1e271d46b71351
kernel-modules-4.18.0-348.el8.s390x.rpm
SHA-256: 6974d70895027ed180061974e8030b58bb0fc8cb42fb10a0f236c049de3a5329
kernel-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: 337c36c5952a770a33d443e5b572530c5825633a92a2bc0abfcc7c1e908b1689
kernel-tools-4.18.0-348.el8.s390x.rpm
SHA-256: b9ac188182b5543844a188e1f5b5c6a66d5730d2d4ccd541adbcd622df9cc902
kernel-tools-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 1c21ca506c19d2064046c8c0877d63a4edfbc390e3b8fe907916004d8fc79151
kernel-zfcpdump-4.18.0-348.el8.s390x.rpm
SHA-256: d0112b619db0939133e914f45afd7bda28ae6cc6339953536a2cbea62fdb6891
kernel-zfcpdump-core-4.18.0-348.el8.s390x.rpm
SHA-256: 4c8faee7af1b2a7a0b5f56f282742650897615481848109e54332d9ef24d6fac
kernel-zfcpdump-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: c214fcc914379d6a0e2b8828283d52d1cd58935a15028675235dd4546aee52af
kernel-zfcpdump-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 9331a8e761e6cd65e5c789b9aa865f6f33295acef4eca50ae3a44e106667261c
kernel-zfcpdump-modules-4.18.0-348.el8.s390x.rpm
SHA-256: 9587e42b7370aece7b203645da1f9d9c2a48602721faa26da72afc8139369f5a
kernel-zfcpdump-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: 90a8b1017569608ce41c4ddc910417a38c70542df0d6b6eb25a094816531376e
perf-4.18.0-348.el8.s390x.rpm
SHA-256: 678727802960bcbf1596ec375c3b0e411059c54ac08c6e3fe36138889de17f0e
perf-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 53e3178e900333d5cbc1773b1d6d5ebae45cde2256036c7e84a2e1c9f03da979
python3-perf-4.18.0-348.el8.s390x.rpm
SHA-256: e50c65a6b5ce8c5dec2230c5ac5d50b42796c7ab56b9f97d2a491e06bb799687
python3-perf-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: e4d81c65c4321594e77a1e595340ef4195e455aac578d1a634d1ae0888dba810
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
s390x
bpftool-4.18.0-348.el8.s390x.rpm
SHA-256: 7bacec32008f2b17c5931858213d34c256f48595efa8e7b2fadcabb26f03a7ed
bpftool-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 8a57d6d076b1fd3692d1c466190fedf44afe2f11ed0fa36371a00002d1b0e17e
kernel-4.18.0-348.el8.s390x.rpm
SHA-256: 4fa75f21924c52939d5dceac795516af84522cf2b6926637e6ce7205c45cfa7d
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.s390x.rpm
SHA-256: 4e0384a2ee7f17c8c1e185a30281d2abc0b04af239bb507e1db26021dc46a2e4
kernel-cross-headers-4.18.0-348.el8.s390x.rpm
SHA-256: 7505baa7a2fc8092f259cb4416aa74da1fd219c1401c9e7c3d8cd17c59610a65
kernel-debug-4.18.0-348.el8.s390x.rpm
SHA-256: 6b03e545c52f19649e6c697f239889ae26db7570a293342b34070cc6f3554f76
kernel-debug-core-4.18.0-348.el8.s390x.rpm
SHA-256: 60894c3e137664f8fe7bbb5fb52b33c66b12e80715a73207e3b193a004806d54
kernel-debug-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: fe3cd1d6ab52faecec2e8990f8807f5c282bf07d3e8a9f6eb7e8b63739054f4e
kernel-debug-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 79fe8ebea6b15ef30337e4175c8c5e5b43bde9cb714a186b13ec6222758a3b17
kernel-debug-modules-4.18.0-348.el8.s390x.rpm
SHA-256: eef332b03d804cc92a7108c4d1dd71ce71d3d40cc41c457009c55fd423ffbeb3
kernel-debug-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: f195eb061d5befecdd8e07c55f428d8af44a55f3a2c93d897a8bb62e16e5a40f
kernel-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 0c6aef727c83e21ba2cf4918f64ef5168e0c25f4c9b6c0fa20b14b5cd4822976
kernel-debuginfo-common-s390x-4.18.0-348.el8.s390x.rpm
SHA-256: b9fe5da1af2a1bff3cbb699ec20fdb3832ce8720026bb45f88bd1831cb24f3ba
kernel-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 398c26ab9c703392670b569dba635737a73c22cff478a8052919349c5455b96d
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.s390x.rpm
SHA-256: a75bf8090a1a0d82cf2c4f61fa9f41ef96c87f0a4eec25020a1e271d46b71351
kernel-modules-4.18.0-348.el8.s390x.rpm
SHA-256: 6974d70895027ed180061974e8030b58bb0fc8cb42fb10a0f236c049de3a5329
kernel-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: 337c36c5952a770a33d443e5b572530c5825633a92a2bc0abfcc7c1e908b1689
kernel-tools-4.18.0-348.el8.s390x.rpm
SHA-256: b9ac188182b5543844a188e1f5b5c6a66d5730d2d4ccd541adbcd622df9cc902
kernel-tools-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 1c21ca506c19d2064046c8c0877d63a4edfbc390e3b8fe907916004d8fc79151
kernel-zfcpdump-4.18.0-348.el8.s390x.rpm
SHA-256: d0112b619db0939133e914f45afd7bda28ae6cc6339953536a2cbea62fdb6891
kernel-zfcpdump-core-4.18.0-348.el8.s390x.rpm
SHA-256: 4c8faee7af1b2a7a0b5f56f282742650897615481848109e54332d9ef24d6fac
kernel-zfcpdump-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: c214fcc914379d6a0e2b8828283d52d1cd58935a15028675235dd4546aee52af
kernel-zfcpdump-devel-4.18.0-348.el8.s390x.rpm
SHA-256: 9331a8e761e6cd65e5c789b9aa865f6f33295acef4eca50ae3a44e106667261c
kernel-zfcpdump-modules-4.18.0-348.el8.s390x.rpm
SHA-256: 9587e42b7370aece7b203645da1f9d9c2a48602721faa26da72afc8139369f5a
kernel-zfcpdump-modules-extra-4.18.0-348.el8.s390x.rpm
SHA-256: 90a8b1017569608ce41c4ddc910417a38c70542df0d6b6eb25a094816531376e
perf-4.18.0-348.el8.s390x.rpm
SHA-256: 678727802960bcbf1596ec375c3b0e411059c54ac08c6e3fe36138889de17f0e
perf-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: 53e3178e900333d5cbc1773b1d6d5ebae45cde2256036c7e84a2e1c9f03da979
python3-perf-4.18.0-348.el8.s390x.rpm
SHA-256: e50c65a6b5ce8c5dec2230c5ac5d50b42796c7ab56b9f97d2a491e06bb799687
python3-perf-debuginfo-4.18.0-348.el8.s390x.rpm
SHA-256: e4d81c65c4321594e77a1e595340ef4195e455aac578d1a634d1ae0888dba810
Red Hat Enterprise Linux for Power, little endian 8
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
ppc64le
bpftool-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9193ce78b7ba78645c25f1f20c7a670e0c83a579f70fff0b284400b6ad1f7c99
bpftool-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: deab09330f3059beb19cc3f7e3c582ba62e821420b7d94957f64540c79c6bc27
kernel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 38d6b3984c40b6a3bd1a8730c39e48edf959738ecf66264f46dcc6c545b6e645
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 75655e5620826db56056b593da94727c495ed57df5c5c9821c55c45afbdb125e
kernel-cross-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 02d1e6a096d2ca097e4b86071815ee362c992f3b68d327825bd3b79c80cced2c
kernel-debug-4.18.0-348.el8.ppc64le.rpm
SHA-256: 82990805d334d96d92c276cbcc49594b6b3d721277eb2a8c0669dedd06317de7
kernel-debug-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 44a52c1759f499e7d3e7498a334e3be1eb5aac620fe9e5bcad26935ded23c427
kernel-debug-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 53c902e3e78b440bbebed2935e03f773752bc69c20c318f0ea98d99689aa47e4
kernel-debug-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: e281a1294f572015f9eb0a040477a9bbd607bc9b6c729a7ba9422bcbbdd3fd0c
kernel-debug-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 2f7ac8916bc0d3244220320a8a1d6234c54bb282cc245f6b0038c28ba6203111
kernel-debug-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 61728b0e0044675a941e2a89175126fd088506cfdc5d3ac2aef0baf843ae1815
kernel-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4b86697450a66272604ce95ae73e54f61678d24462069885dd3b5092b408ed25
kernel-debuginfo-common-ppc64le-4.18.0-348.el8.ppc64le.rpm
SHA-256: fd5538a39769abcc009e4d036819d74d4c39d10edebf3afae50635ab5a6dff6d
kernel-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 7371792278071df1e7cd88292ec33e5777e9071c4dde3da9e8be643827e443ec
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 0fa70f1b8f7b38cfab70a563abcaca3d9470351cf936d8993df1e2cbed3b3725
kernel-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 284eec3fd03c852e705130c528982a332551eb114b7f850a85fb78ec936be974
kernel-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 57c78d1a49e782a9ef56e234932c81fdb349fb50a75931d31b2d66d4a76bf890
kernel-tools-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4ac0f7f612425419a0d78079a6bc1cc27c81b8c8cb1ef8e24c242bf792f28c1a
kernel-tools-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9a3b21330a7cb34a3051ff6f0b9146816b7bed56be857047cade2cd64f4cd713
kernel-tools-libs-4.18.0-348.el8.ppc64le.rpm
SHA-256: d5bc914862ba2935c3961005e6386294bbe426d33a0c93d61efe7027ae5de9da
perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 8bbb3827e3bf67be38e5b9e8aa5dcb6fa6e5c26ca077b1a12fa443ee66ea97f0
perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: ae3b50570476d29bde88ff9e9a37c98166441046aed21402a208b9502992eb45
python3-perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 3edab7d3e47438139438f246878e37dea849be1e8475985b1c9aaf798140ee24
python3-perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 48da833cb7165c518e4f6fe5f9f0fc0022c4eca1de990531f3fa4f75289afadf
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
ppc64le
bpftool-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9193ce78b7ba78645c25f1f20c7a670e0c83a579f70fff0b284400b6ad1f7c99
bpftool-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: deab09330f3059beb19cc3f7e3c582ba62e821420b7d94957f64540c79c6bc27
kernel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 38d6b3984c40b6a3bd1a8730c39e48edf959738ecf66264f46dcc6c545b6e645
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 75655e5620826db56056b593da94727c495ed57df5c5c9821c55c45afbdb125e
kernel-cross-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 02d1e6a096d2ca097e4b86071815ee362c992f3b68d327825bd3b79c80cced2c
kernel-debug-4.18.0-348.el8.ppc64le.rpm
SHA-256: 82990805d334d96d92c276cbcc49594b6b3d721277eb2a8c0669dedd06317de7
kernel-debug-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 44a52c1759f499e7d3e7498a334e3be1eb5aac620fe9e5bcad26935ded23c427
kernel-debug-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 53c902e3e78b440bbebed2935e03f773752bc69c20c318f0ea98d99689aa47e4
kernel-debug-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: e281a1294f572015f9eb0a040477a9bbd607bc9b6c729a7ba9422bcbbdd3fd0c
kernel-debug-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 2f7ac8916bc0d3244220320a8a1d6234c54bb282cc245f6b0038c28ba6203111
kernel-debug-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 61728b0e0044675a941e2a89175126fd088506cfdc5d3ac2aef0baf843ae1815
kernel-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4b86697450a66272604ce95ae73e54f61678d24462069885dd3b5092b408ed25
kernel-debuginfo-common-ppc64le-4.18.0-348.el8.ppc64le.rpm
SHA-256: fd5538a39769abcc009e4d036819d74d4c39d10edebf3afae50635ab5a6dff6d
kernel-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 7371792278071df1e7cd88292ec33e5777e9071c4dde3da9e8be643827e443ec
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 0fa70f1b8f7b38cfab70a563abcaca3d9470351cf936d8993df1e2cbed3b3725
kernel-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 284eec3fd03c852e705130c528982a332551eb114b7f850a85fb78ec936be974
kernel-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 57c78d1a49e782a9ef56e234932c81fdb349fb50a75931d31b2d66d4a76bf890
kernel-tools-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4ac0f7f612425419a0d78079a6bc1cc27c81b8c8cb1ef8e24c242bf792f28c1a
kernel-tools-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9a3b21330a7cb34a3051ff6f0b9146816b7bed56be857047cade2cd64f4cd713
kernel-tools-libs-4.18.0-348.el8.ppc64le.rpm
SHA-256: d5bc914862ba2935c3961005e6386294bbe426d33a0c93d61efe7027ae5de9da
perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 8bbb3827e3bf67be38e5b9e8aa5dcb6fa6e5c26ca077b1a12fa443ee66ea97f0
perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: ae3b50570476d29bde88ff9e9a37c98166441046aed21402a208b9502992eb45
python3-perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 3edab7d3e47438139438f246878e37dea849be1e8475985b1c9aaf798140ee24
python3-perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 48da833cb7165c518e4f6fe5f9f0fc0022c4eca1de990531f3fa4f75289afadf
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
x86_64
bpftool-4.18.0-348.el8.x86_64.rpm
SHA-256: ad79902721081999ce192d5916ba7521b573277ba6f110bcca9eceafbe183745
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-4.18.0-348.el8.x86_64.rpm
SHA-256: f8db084810204ce602db25a74eb549128a91d63e5306c98f9000b3b494b4d5c7
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 124a99e9198ba6b7e6db5b05261ab441377b06237f9280ff1e2ecc1f9c066702
kernel-cross-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: 3e7248eb33c3af0adf02fb54b7acf6d3a45226da7e5958df9da5d165d970efcc
kernel-debug-4.18.0-348.el8.x86_64.rpm
SHA-256: fdf17760562f56f3bb49309391eb8ac0140100386ea87e6bb7b66d0054bfb18f
kernel-debug-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 9a68c9cef94ab91d762606668ababa79fe29d2c0bab44b633dac33aba1d02f85
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debug-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: a14f363e667ac9a0cbe0ec7467003569fab10360817d2c514777fb0e870d53e3
kernel-debug-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: d44a7d5734bea99453ae5b53ef8b9f9291b731919ad9fc70325f161b5800cc43
kernel-debug-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d73e031f9342061aa98496f5e55d2835da9feac4a7af77f46387432b23c12d8e
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: a38b78c7097b0aa92c819602ea8813f5338174cce7be87ee53deafe3a24509dd
kernel-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d25b69d0e9b93331ce683bef853f31f73574b0db1e2a17d0ec68b05fdc85efa1
kernel-tools-4.18.0-348.el8.x86_64.rpm
SHA-256: cdb553531179686a6367489ccdac56cd134b5496f3d53b5385ad1ead57d92d0c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-4.18.0-348.el8.x86_64.rpm
SHA-256: bafbced3162f0765d9904d052d5520ca4d65b9ef0a2e8f487b918b8728187f85
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-4.18.0-348.el8.x86_64.rpm
SHA-256: 918125d42b24a771488a5d3407cac1368643432139a849af88f88ec1be6822a4
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat Enterprise Linux for ARM 64 8
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
aarch64
bpftool-4.18.0-348.el8.aarch64.rpm
SHA-256: 061f861650f7f8cba414321f116cf501a2a21a8e3c70d005039f7620649d4f14
bpftool-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: a21fa48eed61b6db8a592b84b2ab158b74710fe46a83cf372d9fdd869357eb6e
kernel-4.18.0-348.el8.aarch64.rpm
SHA-256: 248e7a8b940fa5e010f7c50312edfc68e8d3e77f5a6d0530f7ade2792a988afb
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.aarch64.rpm
SHA-256: 8b647f819090a91dcc4b5dd6376686ff0fbd0fa185c29e0d30d38b70b95e4998
kernel-cross-headers-4.18.0-348.el8.aarch64.rpm
SHA-256: e5025881e0c9b12b5fecf45a18b611d67aec6c23b48e6b8d7d9f37d063e63554
kernel-debug-4.18.0-348.el8.aarch64.rpm
SHA-256: 0f35b5689134ff0e857576651f8bac553eb35e6d134c2e52c1ad0175bd822c60
kernel-debug-core-4.18.0-348.el8.aarch64.rpm
SHA-256: 5068ff9547f1cde48d777d908c16268b772647babb96a562752731385d43059b
kernel-debug-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: dabcd06d4c22e28d1e923daba9670b0ca9dc63b2cf257a12a39c2a9287b8fbb3
kernel-debug-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: fd18dd0ffe5eb3b7b36cbd43cb51eace1b2ce0dd8511cc3167f8f2c257dcea14
kernel-debug-modules-4.18.0-348.el8.aarch64.rpm
SHA-256: 3e08ae6a3cc69e10ee0cd136891277c2ec0412062e73f0352b93efc13c7062a8
kernel-debug-modules-extra-4.18.0-348.el8.aarch64.rpm
SHA-256: afa261ab28aafb805fe9a68b9482af05135a46449f1d18e6ad8880b32da0e06f
kernel-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 49768a3232478dc0f497fa2ea6c5f42aaf0e1c8e14e56ad15abce4ad532a8937
kernel-debuginfo-common-aarch64-4.18.0-348.el8.aarch64.rpm
SHA-256: 0da5267d391364963e0c8db322029fd965b68c18778ab2eadd4a8324f37a0b6b
kernel-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: 7d1020879d90bd564d537214f508af59171b9d9271163902410501cec5fa0f8a
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.aarch64.rpm
SHA-256: 5c8690ab03f9c06a8639c32d472a9cdc671dd3bc6261848f7f9962b0b17d27a1
kernel-modules-4.18.0-348.el8.aarch64.rpm
SHA-256: eae577b2e445ab239406143111ce189401330d338ea4ab13e19f5c581c4dd0a9
kernel-modules-extra-4.18.0-348.el8.aarch64.rpm
SHA-256: dd4a31d140f26ea612762c668ba375c9fd8a5db1725859d0783cf1a89049f27c
kernel-tools-4.18.0-348.el8.aarch64.rpm
SHA-256: c72ef8377eba628eadf48cfa49fb395717b501989152b513848887959306869b
kernel-tools-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 79c9ad83f0dda01653e30c24ea8b0358c7a0a84a6f684c776bfa2f8c03fc6a27
kernel-tools-libs-4.18.0-348.el8.aarch64.rpm
SHA-256: 18a9f0d2191b9a21cab7d6841d1111d629a573b0e82269cb7aa88d25802620bb
perf-4.18.0-348.el8.aarch64.rpm
SHA-256: ccd3123d4b06e84f1c1231dbac8f2fe20414946ab781727f91c91e2f73bb8366
perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 3b62d951cfc1f539b5e3355ffe225fcfaa3b3c14a51c930e408331cca3b9bf4c
python3-perf-4.18.0-348.el8.aarch64.rpm
SHA-256: 8787f3fd81e309e48f1637024be8b25f7c3588ec2dff9d72fb50a0f53546f86d
python3-perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 9e2a78e56af04b5f1d60b91e433a428c6d3b583b7306b6cc65b349d768052156
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
ppc64le
bpftool-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9193ce78b7ba78645c25f1f20c7a670e0c83a579f70fff0b284400b6ad1f7c99
bpftool-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: deab09330f3059beb19cc3f7e3c582ba62e821420b7d94957f64540c79c6bc27
kernel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 38d6b3984c40b6a3bd1a8730c39e48edf959738ecf66264f46dcc6c545b6e645
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 75655e5620826db56056b593da94727c495ed57df5c5c9821c55c45afbdb125e
kernel-cross-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 02d1e6a096d2ca097e4b86071815ee362c992f3b68d327825bd3b79c80cced2c
kernel-debug-4.18.0-348.el8.ppc64le.rpm
SHA-256: 82990805d334d96d92c276cbcc49594b6b3d721277eb2a8c0669dedd06317de7
kernel-debug-core-4.18.0-348.el8.ppc64le.rpm
SHA-256: 44a52c1759f499e7d3e7498a334e3be1eb5aac620fe9e5bcad26935ded23c427
kernel-debug-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 53c902e3e78b440bbebed2935e03f773752bc69c20c318f0ea98d99689aa47e4
kernel-debug-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: e281a1294f572015f9eb0a040477a9bbd607bc9b6c729a7ba9422bcbbdd3fd0c
kernel-debug-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 2f7ac8916bc0d3244220320a8a1d6234c54bb282cc245f6b0038c28ba6203111
kernel-debug-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 61728b0e0044675a941e2a89175126fd088506cfdc5d3ac2aef0baf843ae1815
kernel-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4b86697450a66272604ce95ae73e54f61678d24462069885dd3b5092b408ed25
kernel-debuginfo-common-ppc64le-4.18.0-348.el8.ppc64le.rpm
SHA-256: fd5538a39769abcc009e4d036819d74d4c39d10edebf3afae50635ab5a6dff6d
kernel-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: 7371792278071df1e7cd88292ec33e5777e9071c4dde3da9e8be643827e443ec
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.ppc64le.rpm
SHA-256: 0fa70f1b8f7b38cfab70a563abcaca3d9470351cf936d8993df1e2cbed3b3725
kernel-modules-4.18.0-348.el8.ppc64le.rpm
SHA-256: 284eec3fd03c852e705130c528982a332551eb114b7f850a85fb78ec936be974
kernel-modules-extra-4.18.0-348.el8.ppc64le.rpm
SHA-256: 57c78d1a49e782a9ef56e234932c81fdb349fb50a75931d31b2d66d4a76bf890
kernel-tools-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4ac0f7f612425419a0d78079a6bc1cc27c81b8c8cb1ef8e24c242bf792f28c1a
kernel-tools-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9a3b21330a7cb34a3051ff6f0b9146816b7bed56be857047cade2cd64f4cd713
kernel-tools-libs-4.18.0-348.el8.ppc64le.rpm
SHA-256: d5bc914862ba2935c3961005e6386294bbe426d33a0c93d61efe7027ae5de9da
perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 8bbb3827e3bf67be38e5b9e8aa5dcb6fa6e5c26ca077b1a12fa443ee66ea97f0
perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: ae3b50570476d29bde88ff9e9a37c98166441046aed21402a208b9502992eb45
python3-perf-4.18.0-348.el8.ppc64le.rpm
SHA-256: 3edab7d3e47438139438f246878e37dea849be1e8475985b1c9aaf798140ee24
python3-perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 48da833cb7165c518e4f6fe5f9f0fc0022c4eca1de990531f3fa4f75289afadf
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
x86_64
bpftool-4.18.0-348.el8.x86_64.rpm
SHA-256: ad79902721081999ce192d5916ba7521b573277ba6f110bcca9eceafbe183745
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-4.18.0-348.el8.x86_64.rpm
SHA-256: f8db084810204ce602db25a74eb549128a91d63e5306c98f9000b3b494b4d5c7
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 124a99e9198ba6b7e6db5b05261ab441377b06237f9280ff1e2ecc1f9c066702
kernel-cross-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: 3e7248eb33c3af0adf02fb54b7acf6d3a45226da7e5958df9da5d165d970efcc
kernel-debug-4.18.0-348.el8.x86_64.rpm
SHA-256: fdf17760562f56f3bb49309391eb8ac0140100386ea87e6bb7b66d0054bfb18f
kernel-debug-core-4.18.0-348.el8.x86_64.rpm
SHA-256: 9a68c9cef94ab91d762606668ababa79fe29d2c0bab44b633dac33aba1d02f85
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debug-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: a14f363e667ac9a0cbe0ec7467003569fab10360817d2c514777fb0e870d53e3
kernel-debug-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: d44a7d5734bea99453ae5b53ef8b9f9291b731919ad9fc70325f161b5800cc43
kernel-debug-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d73e031f9342061aa98496f5e55d2835da9feac4a7af77f46387432b23c12d8e
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: 1544f441f2c5a32ecad3d7ac875020899ce59e419870bc5c6516f7562f538ec5
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.x86_64.rpm
SHA-256: f6273b7e87bc756eab617bb90b821d3956d7a30d08c2badf66aa523f92510951
kernel-modules-4.18.0-348.el8.x86_64.rpm
SHA-256: a38b78c7097b0aa92c819602ea8813f5338174cce7be87ee53deafe3a24509dd
kernel-modules-extra-4.18.0-348.el8.x86_64.rpm
SHA-256: d25b69d0e9b93331ce683bef853f31f73574b0db1e2a17d0ec68b05fdc85efa1
kernel-tools-4.18.0-348.el8.x86_64.rpm
SHA-256: cdb553531179686a6367489ccdac56cd134b5496f3d53b5385ad1ead57d92d0c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-4.18.0-348.el8.x86_64.rpm
SHA-256: bafbced3162f0765d9904d052d5520ca4d65b9ef0a2e8f487b918b8728187f85
perf-4.18.0-348.el8.x86_64.rpm
SHA-256: c029e94e18aff606bbc541b6fbf841d29c22a84ed6776960e7b1fb185d10a32e
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-4.18.0-348.el8.x86_64.rpm
SHA-256: 918125d42b24a771488a5d3407cac1368643432139a849af88f88ec1be6822a4
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: e7660b6a433541aa55a8baf2f3c54fd10340b378207602fc7169fb972915b4f4
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
bpftool-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: deab09330f3059beb19cc3f7e3c582ba62e821420b7d94957f64540c79c6bc27
kernel-debug-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 53c902e3e78b440bbebed2935e03f773752bc69c20c318f0ea98d99689aa47e4
kernel-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4b86697450a66272604ce95ae73e54f61678d24462069885dd3b5092b408ed25
kernel-debuginfo-common-ppc64le-4.18.0-348.el8.ppc64le.rpm
SHA-256: fd5538a39769abcc009e4d036819d74d4c39d10edebf3afae50635ab5a6dff6d
kernel-tools-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9a3b21330a7cb34a3051ff6f0b9146816b7bed56be857047cade2cd64f4cd713
kernel-tools-libs-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: d30b9cb8ae49857364df44370719dd1dbc4e1d32a09f3193eb9533b580d06174
perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: ae3b50570476d29bde88ff9e9a37c98166441046aed21402a208b9502992eb45
python3-perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 48da833cb7165c518e4f6fe5f9f0fc0022c4eca1de990531f3fa4f75289afadf
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
bpftool-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: a21fa48eed61b6db8a592b84b2ab158b74710fe46a83cf372d9fdd869357eb6e
kernel-debug-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: dabcd06d4c22e28d1e923daba9670b0ca9dc63b2cf257a12a39c2a9287b8fbb3
kernel-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 49768a3232478dc0f497fa2ea6c5f42aaf0e1c8e14e56ad15abce4ad532a8937
kernel-debuginfo-common-aarch64-4.18.0-348.el8.aarch64.rpm
SHA-256: 0da5267d391364963e0c8db322029fd965b68c18778ab2eadd4a8324f37a0b6b
kernel-tools-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 79c9ad83f0dda01653e30c24ea8b0358c7a0a84a6f684c776bfa2f8c03fc6a27
kernel-tools-libs-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: 8b6385f71de6dca397aa6c032ce22ca0dbc668103f8da41c093615027220cfc6
perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 3b62d951cfc1f539b5e3355ffe225fcfaa3b3c14a51c930e408331cca3b9bf4c
python3-perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 9e2a78e56af04b5f1d60b91e433a428c6d3b583b7306b6cc65b349d768052156
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-348.el8.src.rpm
SHA-256: 33f297fedf3d6cccb8e6c8c5daf7872ee9cd6a25af18254e3c2d3434cda33a0b
aarch64
bpftool-4.18.0-348.el8.aarch64.rpm
SHA-256: 061f861650f7f8cba414321f116cf501a2a21a8e3c70d005039f7620649d4f14
bpftool-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: a21fa48eed61b6db8a592b84b2ab158b74710fe46a83cf372d9fdd869357eb6e
kernel-4.18.0-348.el8.aarch64.rpm
SHA-256: 248e7a8b940fa5e010f7c50312edfc68e8d3e77f5a6d0530f7ade2792a988afb
kernel-abi-stablelists-4.18.0-348.el8.noarch.rpm
SHA-256: 4ff4fce87d53f79404a62723a7eefaa5a859f4c353bd8a7995b8ca9c5edf4c59
kernel-core-4.18.0-348.el8.aarch64.rpm
SHA-256: 8b647f819090a91dcc4b5dd6376686ff0fbd0fa185c29e0d30d38b70b95e4998
kernel-cross-headers-4.18.0-348.el8.aarch64.rpm
SHA-256: e5025881e0c9b12b5fecf45a18b611d67aec6c23b48e6b8d7d9f37d063e63554
kernel-debug-4.18.0-348.el8.aarch64.rpm
SHA-256: 0f35b5689134ff0e857576651f8bac553eb35e6d134c2e52c1ad0175bd822c60
kernel-debug-core-4.18.0-348.el8.aarch64.rpm
SHA-256: 5068ff9547f1cde48d777d908c16268b772647babb96a562752731385d43059b
kernel-debug-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: dabcd06d4c22e28d1e923daba9670b0ca9dc63b2cf257a12a39c2a9287b8fbb3
kernel-debug-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: fd18dd0ffe5eb3b7b36cbd43cb51eace1b2ce0dd8511cc3167f8f2c257dcea14
kernel-debug-modules-4.18.0-348.el8.aarch64.rpm
SHA-256: 3e08ae6a3cc69e10ee0cd136891277c2ec0412062e73f0352b93efc13c7062a8
kernel-debug-modules-extra-4.18.0-348.el8.aarch64.rpm
SHA-256: afa261ab28aafb805fe9a68b9482af05135a46449f1d18e6ad8880b32da0e06f
kernel-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 49768a3232478dc0f497fa2ea6c5f42aaf0e1c8e14e56ad15abce4ad532a8937
kernel-debuginfo-common-aarch64-4.18.0-348.el8.aarch64.rpm
SHA-256: 0da5267d391364963e0c8db322029fd965b68c18778ab2eadd4a8324f37a0b6b
kernel-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: 7d1020879d90bd564d537214f508af59171b9d9271163902410501cec5fa0f8a
kernel-doc-4.18.0-348.el8.noarch.rpm
SHA-256: 26a0d7794613e588d5ff038b876d068ce1fb9221f22e0cbf5c4b2ee43d22d86b
kernel-headers-4.18.0-348.el8.aarch64.rpm
SHA-256: 5c8690ab03f9c06a8639c32d472a9cdc671dd3bc6261848f7f9962b0b17d27a1
kernel-modules-4.18.0-348.el8.aarch64.rpm
SHA-256: eae577b2e445ab239406143111ce189401330d338ea4ab13e19f5c581c4dd0a9
kernel-modules-extra-4.18.0-348.el8.aarch64.rpm
SHA-256: dd4a31d140f26ea612762c668ba375c9fd8a5db1725859d0783cf1a89049f27c
kernel-tools-4.18.0-348.el8.aarch64.rpm
SHA-256: c72ef8377eba628eadf48cfa49fb395717b501989152b513848887959306869b
kernel-tools-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 79c9ad83f0dda01653e30c24ea8b0358c7a0a84a6f684c776bfa2f8c03fc6a27
kernel-tools-libs-4.18.0-348.el8.aarch64.rpm
SHA-256: 18a9f0d2191b9a21cab7d6841d1111d629a573b0e82269cb7aa88d25802620bb
perf-4.18.0-348.el8.aarch64.rpm
SHA-256: ccd3123d4b06e84f1c1231dbac8f2fe20414946ab781727f91c91e2f73bb8366
perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 3b62d951cfc1f539b5e3355ffe225fcfaa3b3c14a51c930e408331cca3b9bf4c
python3-perf-4.18.0-348.el8.aarch64.rpm
SHA-256: 8787f3fd81e309e48f1637024be8b25f7c3588ec2dff9d72fb50a0f53546f86d
python3-perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 9e2a78e56af04b5f1d60b91e433a428c6d3b583b7306b6cc65b349d768052156
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: cd3a66fe931bc0fc9dc40ead70deecfc99b30ffd9f34d683aecb54584901ec4b
kernel-debug-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: b0076538b73780bdab0d846f5b694df151e00071d01d7481779d89595ed99dbb
kernel-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 7c8977bf8e99da77e82b9552ef00b155fc6a1aebf3ebb8ca55d85bae8de7f71f
kernel-debuginfo-common-x86_64-4.18.0-348.el8.x86_64.rpm
SHA-256: b66509ea82f18147544e72960b4c95a0535884afd5c8d9c012d5e00c5636c95c
kernel-tools-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: a1feddecb77ea504134416d502da9175be84c2440b1f27f46eea5475ec2a4a92
kernel-tools-libs-devel-4.18.0-348.el8.x86_64.rpm
SHA-256: e7660b6a433541aa55a8baf2f3c54fd10340b378207602fc7169fb972915b4f4
perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 8b1e3220e0e1996030981daf0890b460cea01f278bbc696b137edbb7c0e7a93c
python3-perf-debuginfo-4.18.0-348.el8.x86_64.rpm
SHA-256: 12e3a419bd422d393c1224e82aa4670e3c3f63c15aabee230d876e822d4e704b
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: deab09330f3059beb19cc3f7e3c582ba62e821420b7d94957f64540c79c6bc27
kernel-debug-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 53c902e3e78b440bbebed2935e03f773752bc69c20c318f0ea98d99689aa47e4
kernel-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 4b86697450a66272604ce95ae73e54f61678d24462069885dd3b5092b408ed25
kernel-debuginfo-common-ppc64le-4.18.0-348.el8.ppc64le.rpm
SHA-256: fd5538a39769abcc009e4d036819d74d4c39d10edebf3afae50635ab5a6dff6d
kernel-tools-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 9a3b21330a7cb34a3051ff6f0b9146816b7bed56be857047cade2cd64f4cd713
kernel-tools-libs-devel-4.18.0-348.el8.ppc64le.rpm
SHA-256: d30b9cb8ae49857364df44370719dd1dbc4e1d32a09f3193eb9533b580d06174
perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: ae3b50570476d29bde88ff9e9a37c98166441046aed21402a208b9502992eb45
python3-perf-debuginfo-4.18.0-348.el8.ppc64le.rpm
SHA-256: 48da833cb7165c518e4f6fe5f9f0fc0022c4eca1de990531f3fa4f75289afadf
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: a21fa48eed61b6db8a592b84b2ab158b74710fe46a83cf372d9fdd869357eb6e
kernel-debug-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: dabcd06d4c22e28d1e923daba9670b0ca9dc63b2cf257a12a39c2a9287b8fbb3
kernel-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 49768a3232478dc0f497fa2ea6c5f42aaf0e1c8e14e56ad15abce4ad532a8937
kernel-debuginfo-common-aarch64-4.18.0-348.el8.aarch64.rpm
SHA-256: 0da5267d391364963e0c8db322029fd965b68c18778ab2eadd4a8324f37a0b6b
kernel-tools-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 79c9ad83f0dda01653e30c24ea8b0358c7a0a84a6f684c776bfa2f8c03fc6a27
kernel-tools-libs-devel-4.18.0-348.el8.aarch64.rpm
SHA-256: 8b6385f71de6dca397aa6c032ce22ca0dbc668103f8da41c093615027220cfc6
perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 3b62d951cfc1f539b5e3355ffe225fcfaa3b3c14a51c930e408331cca3b9bf4c
python3-perf-debuginfo-4.18.0-348.el8.aarch64.rpm
SHA-256: 9e2a78e56af04b5f1d60b91e433a428c6d3b583b7306b6cc65b349d768052156
Related news
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that, if successfully exploited, could lead to a local privilege escalation and allow a threat actor to gain root privileges. Tracked as CVE-2023-4911 (CVSS score: 7.8), the issue is a buffer overflow that resides in the dynamic loader's processing of the GLIBC_TUNABLES
Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6013-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Gentoo Linux Security Advisory 202209-16 - Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. Versions less than 5.63 are affected.
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.
Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key
Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.
Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...
Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Pexip Infinity before 28.1 allows remote attackers to trigger a software abort via G.719.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
In param_find_digests_internal and related functions of the Titan-M source, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222472803References: N/A
A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
In getSerialForPackage of DeviceIdentifiersPolicyService.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-192587406
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontr...
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.
A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
An issue was discovered in Wind River VxWorks 7. The memory allocator has a possible integer overflow in calculating a memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Multiple issues in libxml2.