Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5819: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090484)
  • enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416)
  • Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434)
  • blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150)
  • SCSI updates for RHEL 8.7 (BZ#2100254)
  • Kernel bug on mm/slub.c:314 (BZ#2102251)
  • Implement new tc action for check_pkt_len (BZ#2102333)
  • too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002)
  • Connectx6-DX, mlx5 , backport 087032ee7021 (“net/mlx5e: TC, Fix ct_clear overwriting ct action metadata”) (BZ#2104012)
  • mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013)
  • tcp: request_sock leak in Calico OCP (BZ#2104670)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Enterprise Linux for x86_64 8

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

x86_64

bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 339497d701832a3d28c3d517768a3fd317ed8a843c599ef3db030f184b575d31

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1504aaf806d0c900dc98fcb9fe4a41e1d93e8a87f7a6e152920fb470ef27069f

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 3f51330b99201d97f87f9034506132ae423a6c2bf817d7d20ad22d43e15e6190

kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: d958adcf4bc425fcc409b66dc06626194aa6598673f64aaa9163599720da6ae7

kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 89afa5294d47525d96041f336bcb67e0d7212d10fd1f6e3ad46336a4180a43d6

kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ac43a55e6f6b9075fbae51a5ade02eafceaeb1416b6079331d8b0a828332f513

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: af5507867218b0b2012a6f427b773965e534277beab16b67c937daac6883c1eb

kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7b3f302cd69f47e4233afe55094b907ee0f790c024e964f8380f51cfcda4a0b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: fed7204412da9c17e884df01d240ae10134884c18cfa7000fcab4484b612af7a

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 59fcde577610db98d4c12cd8744984c01999cf0abd84b478b5cceb4142d60a7b

kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7a1a97300b04e55382f8522ad8cb4608c1c6f44d700ca38db802d55e0b20055a

kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 4bd017acb30dd3a9fc905f16756cb8905a8e20d8b9994e60a4510e1f91d3304d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 994dbfc990eb47da6437bde83b1e185b8a806100d4032bae83e3bfe9e0d85a07

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 53b143093c33aa64f2e822b8513739264d194ee6b33f65b8736693c78897efed

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

x86_64

bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 339497d701832a3d28c3d517768a3fd317ed8a843c599ef3db030f184b575d31

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1504aaf806d0c900dc98fcb9fe4a41e1d93e8a87f7a6e152920fb470ef27069f

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 3f51330b99201d97f87f9034506132ae423a6c2bf817d7d20ad22d43e15e6190

kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: d958adcf4bc425fcc409b66dc06626194aa6598673f64aaa9163599720da6ae7

kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 89afa5294d47525d96041f336bcb67e0d7212d10fd1f6e3ad46336a4180a43d6

kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ac43a55e6f6b9075fbae51a5ade02eafceaeb1416b6079331d8b0a828332f513

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: af5507867218b0b2012a6f427b773965e534277beab16b67c937daac6883c1eb

kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7b3f302cd69f47e4233afe55094b907ee0f790c024e964f8380f51cfcda4a0b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: fed7204412da9c17e884df01d240ae10134884c18cfa7000fcab4484b612af7a

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 59fcde577610db98d4c12cd8744984c01999cf0abd84b478b5cceb4142d60a7b

kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7a1a97300b04e55382f8522ad8cb4608c1c6f44d700ca38db802d55e0b20055a

kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 4bd017acb30dd3a9fc905f16756cb8905a8e20d8b9994e60a4510e1f91d3304d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 994dbfc990eb47da6437bde83b1e185b8a806100d4032bae83e3bfe9e0d85a07

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 53b143093c33aa64f2e822b8513739264d194ee6b33f65b8736693c78897efed

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

x86_64

bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 339497d701832a3d28c3d517768a3fd317ed8a843c599ef3db030f184b575d31

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1504aaf806d0c900dc98fcb9fe4a41e1d93e8a87f7a6e152920fb470ef27069f

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 3f51330b99201d97f87f9034506132ae423a6c2bf817d7d20ad22d43e15e6190

kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: d958adcf4bc425fcc409b66dc06626194aa6598673f64aaa9163599720da6ae7

kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 89afa5294d47525d96041f336bcb67e0d7212d10fd1f6e3ad46336a4180a43d6

kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ac43a55e6f6b9075fbae51a5ade02eafceaeb1416b6079331d8b0a828332f513

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: af5507867218b0b2012a6f427b773965e534277beab16b67c937daac6883c1eb

kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7b3f302cd69f47e4233afe55094b907ee0f790c024e964f8380f51cfcda4a0b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: fed7204412da9c17e884df01d240ae10134884c18cfa7000fcab4484b612af7a

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 59fcde577610db98d4c12cd8744984c01999cf0abd84b478b5cceb4142d60a7b

kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7a1a97300b04e55382f8522ad8cb4608c1c6f44d700ca38db802d55e0b20055a

kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 4bd017acb30dd3a9fc905f16756cb8905a8e20d8b9994e60a4510e1f91d3304d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 994dbfc990eb47da6437bde83b1e185b8a806100d4032bae83e3bfe9e0d85a07

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 53b143093c33aa64f2e822b8513739264d194ee6b33f65b8736693c78897efed

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

s390x

bpftool-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 8111d81ec2b589892aab83e3d7ba5ba9e1725051df2e4a770b190595bb2dfd57

bpftool-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 023131900fba526614821bc4d9056cd39d679a9aa626ed14c4a09f172ede822e

kernel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 7237a378eb955aeec9e9dd06526676a2783e0807a7c72e1018598122d7caca56

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 89e694019b29aee672591364c67a2e342ee08b2aff219eaad3326991237db8b9

kernel-cross-headers-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9716593c6be0ded2da43eed8cb1bc330f56c77b7ca7593433660606172741401

kernel-debug-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 5195ea24c6b5b43e3a4ed3a8e2a88640a3c34c10d4bea889d1e325e12515428f

kernel-debug-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 81dcdaf20288d1e21b3977028a6780dc122ac3efa04ee658629ee1b93d1d0bf1

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: e8fd7a63df0445c4812d14445af887dc9b5f726dfdc274241d5c3949d88b0712

kernel-debug-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 57115ee1e836ba36c54bfa2e4fccfd46a21fa318c0c68298d89b2c9ef5ef3ea7

kernel-debug-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: b0b4f5fb1217b42faf8a519c67b948c4f3da4a4b04c69077576f582d4760c4b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 0b2ae0f64f4ba4a0fd2df45b80deb5eb69ef8a3319f468a43542553a6fc8c82a

kernel-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 047dd9cad11ecc414001c60c392040e8dce99263d12ab0ed41bf048173f7364f

kernel-debuginfo-common-s390x-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 11a55b5ea5d8e895aec1f1bcee9c77c0269eb47e2f6258f6cce5951e1b7b8337

kernel-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 6da6bc952d941da8ebe3b258e05959af046716d89926c61891b8d1b74ae5a017

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 4a59b294873533d72e25867f16637aa4b97d85fc3540bab388f08bc1d6846c1d

kernel-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f829a4672cb604551f0bea7cf9b205310930ed6a3cdcc438f6b41dfde6cf2515

kernel-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 70ecc2356e2d83844150ceb25fcfa35ff8ff2da6fefaeb54352d2eefe3c510f1

kernel-tools-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 2553a18481731849e6dca9eb8476cc172702a008b31f35076704fb1776a63bde

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f1f034dcd1a2f362013742bfa04960fa377308cf83e733eac8677c56dd161fa3

kernel-zfcpdump-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9b4dec0ff53a57b7a2b3c7b850451e3f1e0b410c0462cb1dc7b73f15b29fda44

kernel-zfcpdump-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 1b8f1e763a24e39af462f3d819b105f9da7ceccd55675ff2f9a9b074c477c7ba

kernel-zfcpdump-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: e070328a7f004310879f31019c99a1b2925413b73c4c08d1528bcb8c6c60981e

kernel-zfcpdump-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: d6890f64f130e9cb380d190bb1b5fe98f5e003a95083d5d3cd15210748fb6167

kernel-zfcpdump-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: ed0e9594e6fcc6718239397017875465c90b71a9aed70a5720237b642685dbcd

kernel-zfcpdump-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 86834c262a25944f4d6120171c5184643a030ac0a3db32c6478f1fd3b0a3232f

perf-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9ca88f71b492f1b20bc59ce475b8794889f231ac7beb65fd2f64bcc4f7b1a33a

perf-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: cf1baa44950b0e2887f1a5e58bf855452bdacfb9387a6f59632f10eb3fd4c745

python3-perf-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f0394318e240ce81f7b467ec09082448a59a05f61437f7c14d30232cdaae58c2

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 48a73b6e5ad2bf3714161c34d06f1b80040a6e86151fd21d19274e8f363f90ef

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

s390x

bpftool-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 8111d81ec2b589892aab83e3d7ba5ba9e1725051df2e4a770b190595bb2dfd57

bpftool-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 023131900fba526614821bc4d9056cd39d679a9aa626ed14c4a09f172ede822e

kernel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 7237a378eb955aeec9e9dd06526676a2783e0807a7c72e1018598122d7caca56

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 89e694019b29aee672591364c67a2e342ee08b2aff219eaad3326991237db8b9

kernel-cross-headers-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9716593c6be0ded2da43eed8cb1bc330f56c77b7ca7593433660606172741401

kernel-debug-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 5195ea24c6b5b43e3a4ed3a8e2a88640a3c34c10d4bea889d1e325e12515428f

kernel-debug-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 81dcdaf20288d1e21b3977028a6780dc122ac3efa04ee658629ee1b93d1d0bf1

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: e8fd7a63df0445c4812d14445af887dc9b5f726dfdc274241d5c3949d88b0712

kernel-debug-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 57115ee1e836ba36c54bfa2e4fccfd46a21fa318c0c68298d89b2c9ef5ef3ea7

kernel-debug-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: b0b4f5fb1217b42faf8a519c67b948c4f3da4a4b04c69077576f582d4760c4b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 0b2ae0f64f4ba4a0fd2df45b80deb5eb69ef8a3319f468a43542553a6fc8c82a

kernel-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 047dd9cad11ecc414001c60c392040e8dce99263d12ab0ed41bf048173f7364f

kernel-debuginfo-common-s390x-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 11a55b5ea5d8e895aec1f1bcee9c77c0269eb47e2f6258f6cce5951e1b7b8337

kernel-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 6da6bc952d941da8ebe3b258e05959af046716d89926c61891b8d1b74ae5a017

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 4a59b294873533d72e25867f16637aa4b97d85fc3540bab388f08bc1d6846c1d

kernel-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f829a4672cb604551f0bea7cf9b205310930ed6a3cdcc438f6b41dfde6cf2515

kernel-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 70ecc2356e2d83844150ceb25fcfa35ff8ff2da6fefaeb54352d2eefe3c510f1

kernel-tools-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 2553a18481731849e6dca9eb8476cc172702a008b31f35076704fb1776a63bde

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f1f034dcd1a2f362013742bfa04960fa377308cf83e733eac8677c56dd161fa3

kernel-zfcpdump-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9b4dec0ff53a57b7a2b3c7b850451e3f1e0b410c0462cb1dc7b73f15b29fda44

kernel-zfcpdump-core-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 1b8f1e763a24e39af462f3d819b105f9da7ceccd55675ff2f9a9b074c477c7ba

kernel-zfcpdump-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: e070328a7f004310879f31019c99a1b2925413b73c4c08d1528bcb8c6c60981e

kernel-zfcpdump-devel-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: d6890f64f130e9cb380d190bb1b5fe98f5e003a95083d5d3cd15210748fb6167

kernel-zfcpdump-modules-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: ed0e9594e6fcc6718239397017875465c90b71a9aed70a5720237b642685dbcd

kernel-zfcpdump-modules-extra-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 86834c262a25944f4d6120171c5184643a030ac0a3db32c6478f1fd3b0a3232f

perf-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 9ca88f71b492f1b20bc59ce475b8794889f231ac7beb65fd2f64bcc4f7b1a33a

perf-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: cf1baa44950b0e2887f1a5e58bf855452bdacfb9387a6f59632f10eb3fd4c745

python3-perf-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: f0394318e240ce81f7b467ec09082448a59a05f61437f7c14d30232cdaae58c2

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.s390x.rpm

SHA-256: 48a73b6e5ad2bf3714161c34d06f1b80040a6e86151fd21d19274e8f363f90ef

Red Hat Enterprise Linux for Power, little endian 8

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

ppc64le

bpftool-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 2f40824acf64525402b4c87388ff4e7d943aa629c6988af6f7a9535684591b84

bpftool-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 639e4bb8ec54dc38aa4e88f1187cf3315e7ba0e479399c3bb23fd18060ef05b1

kernel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: fe2fd9c6bbd37b08732ebc8d7f9cdd3e76b4dff8a695ae43b3cb07eeb9f732ea

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 874f8dfa4f42eca63654a0633bbf4c5af0119b83410293c27f76f1e2e819f631

kernel-cross-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 08ed99d3d93c36feca07c8cd2da6f71508d7f69c07c83486a46e5d1fa2488ee3

kernel-debug-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 99ddc47f80cd436a01320cdc55dc9c21e65aca1bfbe70b2b90529ae84abc51fa

kernel-debug-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 54b5aec67cfc39aedf90b7d949d5509e2970cd4805afb203bfb0a035ed81c0cd

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f021a3c613f179aea24c3447718b50df8191a1f7871d2fd04446923aac019f8e

kernel-debug-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f65b8c978431ccd8b8a35054bf493f543758e2be52c8c21f8dc8312ee3cbc054

kernel-debug-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 678049b5606bb6dbda60660ed65908909ea0444727b3fd4ef333a3d52545ec64

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 90207acfb3386ee50e11cb03f8691cf502b15fbd369c1f0f235b627296dfff8b

kernel-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: edf70ba36570e7c19431f9c1ed7cbbda1330871a54e147949f9229e6caf92241

kernel-debuginfo-common-ppc64le-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 96e9958c16577842b5886ac5dddd463288a0e6edd698e05cd59cbf8b0ebdddb7

kernel-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 0db901d570f83f187377caa6edde1e1d787ce3d1ffe9b782902fbc5a7605dc88

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: dd06709bb72dcd38e44f77f80603076bb70cacfafe5f37dd9f17218af2f6b41b

kernel-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 6edf2cf19cfb7591a926783e796fc79494f3ce11b645ac0bfa13fc22d2ad448d

kernel-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: c3b440afe4b1accd4b5587f38daf7dfbca8141a4598c9956efaa7c684d4aa03d

kernel-tools-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 150890cfdf3c8a158a359a376e83a9117eee6de09dd491347b9b415ada35ef25

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: ee445e78ef7ada0f4fdace7c6f96e864d5cae6eac2d8bc20ce48c4e1bc1ad7fd

kernel-tools-libs-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b4b7b2eefa959ab5d06fcf16ba070e2e837d33b7e3970af839bea5b102616aa2

perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b0075a839769eca86a898f7411102a24244282263390b3c8c2712ccd955da188

perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: cdd8e7a673071747f57f3e0f20cc2f6003aaf2f9d94c47d3505c0a7b710207ab

python3-perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f73700e2c00e800ae6ad754b37a7c1366550dcc1c251b65a94e75ea4d5f43830

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: bc522ffaab5ca8accbd2971074f0187071f5d7be02cbb8492b638318a4447694

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

ppc64le

bpftool-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 2f40824acf64525402b4c87388ff4e7d943aa629c6988af6f7a9535684591b84

bpftool-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 639e4bb8ec54dc38aa4e88f1187cf3315e7ba0e479399c3bb23fd18060ef05b1

kernel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: fe2fd9c6bbd37b08732ebc8d7f9cdd3e76b4dff8a695ae43b3cb07eeb9f732ea

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 874f8dfa4f42eca63654a0633bbf4c5af0119b83410293c27f76f1e2e819f631

kernel-cross-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 08ed99d3d93c36feca07c8cd2da6f71508d7f69c07c83486a46e5d1fa2488ee3

kernel-debug-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 99ddc47f80cd436a01320cdc55dc9c21e65aca1bfbe70b2b90529ae84abc51fa

kernel-debug-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 54b5aec67cfc39aedf90b7d949d5509e2970cd4805afb203bfb0a035ed81c0cd

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f021a3c613f179aea24c3447718b50df8191a1f7871d2fd04446923aac019f8e

kernel-debug-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f65b8c978431ccd8b8a35054bf493f543758e2be52c8c21f8dc8312ee3cbc054

kernel-debug-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 678049b5606bb6dbda60660ed65908909ea0444727b3fd4ef333a3d52545ec64

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 90207acfb3386ee50e11cb03f8691cf502b15fbd369c1f0f235b627296dfff8b

kernel-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: edf70ba36570e7c19431f9c1ed7cbbda1330871a54e147949f9229e6caf92241

kernel-debuginfo-common-ppc64le-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 96e9958c16577842b5886ac5dddd463288a0e6edd698e05cd59cbf8b0ebdddb7

kernel-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 0db901d570f83f187377caa6edde1e1d787ce3d1ffe9b782902fbc5a7605dc88

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: dd06709bb72dcd38e44f77f80603076bb70cacfafe5f37dd9f17218af2f6b41b

kernel-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 6edf2cf19cfb7591a926783e796fc79494f3ce11b645ac0bfa13fc22d2ad448d

kernel-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: c3b440afe4b1accd4b5587f38daf7dfbca8141a4598c9956efaa7c684d4aa03d

kernel-tools-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 150890cfdf3c8a158a359a376e83a9117eee6de09dd491347b9b415ada35ef25

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: ee445e78ef7ada0f4fdace7c6f96e864d5cae6eac2d8bc20ce48c4e1bc1ad7fd

kernel-tools-libs-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b4b7b2eefa959ab5d06fcf16ba070e2e837d33b7e3970af839bea5b102616aa2

perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b0075a839769eca86a898f7411102a24244282263390b3c8c2712ccd955da188

perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: cdd8e7a673071747f57f3e0f20cc2f6003aaf2f9d94c47d3505c0a7b710207ab

python3-perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f73700e2c00e800ae6ad754b37a7c1366550dcc1c251b65a94e75ea4d5f43830

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: bc522ffaab5ca8accbd2971074f0187071f5d7be02cbb8492b638318a4447694

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

x86_64

bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 339497d701832a3d28c3d517768a3fd317ed8a843c599ef3db030f184b575d31

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1504aaf806d0c900dc98fcb9fe4a41e1d93e8a87f7a6e152920fb470ef27069f

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 3f51330b99201d97f87f9034506132ae423a6c2bf817d7d20ad22d43e15e6190

kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: d958adcf4bc425fcc409b66dc06626194aa6598673f64aaa9163599720da6ae7

kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 89afa5294d47525d96041f336bcb67e0d7212d10fd1f6e3ad46336a4180a43d6

kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ac43a55e6f6b9075fbae51a5ade02eafceaeb1416b6079331d8b0a828332f513

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: af5507867218b0b2012a6f427b773965e534277beab16b67c937daac6883c1eb

kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7b3f302cd69f47e4233afe55094b907ee0f790c024e964f8380f51cfcda4a0b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: fed7204412da9c17e884df01d240ae10134884c18cfa7000fcab4484b612af7a

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 59fcde577610db98d4c12cd8744984c01999cf0abd84b478b5cceb4142d60a7b

kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7a1a97300b04e55382f8522ad8cb4608c1c6f44d700ca38db802d55e0b20055a

kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 4bd017acb30dd3a9fc905f16756cb8905a8e20d8b9994e60a4510e1f91d3304d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 994dbfc990eb47da6437bde83b1e185b8a806100d4032bae83e3bfe9e0d85a07

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 53b143093c33aa64f2e822b8513739264d194ee6b33f65b8736693c78897efed

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat Enterprise Linux for ARM 64 8

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

aarch64

bpftool-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ea4055a85fde63d53465ec7ff76e919a0f4a0ab282227009129e44b090d528a2

bpftool-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ec8b011c48df8bc8dee0b28e22436e2981acd919edee2bac8edc43493165e27b

kernel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f78aee8b2fcde52023e736bbf798aeb1704a77b277c6c73a8992a3b5c463225a

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 72002c2715ea70d3aebab42527c78531356d425589dbc82568410f64c4960c2b

kernel-cross-headers-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 785d9928678ad0b6f2e01623159969c3f64575a898d16fea2367ce331a9d2f8a

kernel-debug-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: fa6ffb5040f5d42b4ea1654e97dfa470ad13cdcde8ed384198473d0a78a7f588

kernel-debug-core-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 137e3ae779be781d188c6ae7b71a8000695bf92b77e84c9af9134122c371d7ba

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 80c3c42593f471b5fc5412a943e5ea8c31693e9f78337c68fe8c69ee0f2337f1

kernel-debug-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 6a9894e079c2647907b92bfb42b8d8561323c9fda819437a9c6342c75c8cf9f4

kernel-debug-modules-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 9d13c9aa921d65feaef0baaacf9320c0463b97aa7e686b9daaf288389e827bd0

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: fd8ffe8c8c4bbe7255ee8eb951363d362747d30142f617750138ab1e0907434f

kernel-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 56dc8620c292bc4b2d1ebf090c6d2a4835815409f20ec9576aee72754f51f562

kernel-debuginfo-common-aarch64-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 7c5c184e118c1f1ea785bb0bca597d291bb46fe384df58b48896cd174a0ea04a

kernel-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 3b74bb341ed1d7390e24462f64dbba143a22a149730158bc78e2821326cb6563

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 863c6a50e3140f1edb625e8f54e904868a7fe8a9d83c7f26b3f07a1e4882c283

kernel-modules-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 6eae30b6edcb1be5ead175b6a80100ab74a49f3978c8e6013cdcff899e4fcbee

kernel-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 19a933062d5f52c320ac8aec8d2cda791a44964175a4ebb8f52570fe34474bb4

kernel-tools-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: eb2838bb875722e7f9802197c2ae896c0f10e2fcd797ab3b746adf34aed1ed1d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f3e67bc7c238c09da5872b971f7ffdac0df7d438cc95d047b0092cdaf4918d2d

kernel-tools-libs-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 4939110a83ea087413f551b1bad2e1f7a8ca04ee9bc0679f253db8b887c14711

perf-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92f31b2bf096ef45196cef0014981332ddfeba0b29d779bea400ce26b28404db

perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92ab331458fbe0b32f6dccf7ac76c8c793c9208402d7cca5e38aff84c7617a27

python3-perf-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 935998390adbb5d23f4e3f38421e14def49c4bd323d34692a7716f2e66d78bf4

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 2468691f982741b42e7cc00ce7c3a5f005a4a4be5b1ca334c18ddfa17210af29

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

ppc64le

bpftool-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 2f40824acf64525402b4c87388ff4e7d943aa629c6988af6f7a9535684591b84

bpftool-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 639e4bb8ec54dc38aa4e88f1187cf3315e7ba0e479399c3bb23fd18060ef05b1

kernel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: fe2fd9c6bbd37b08732ebc8d7f9cdd3e76b4dff8a695ae43b3cb07eeb9f732ea

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 874f8dfa4f42eca63654a0633bbf4c5af0119b83410293c27f76f1e2e819f631

kernel-cross-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 08ed99d3d93c36feca07c8cd2da6f71508d7f69c07c83486a46e5d1fa2488ee3

kernel-debug-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 99ddc47f80cd436a01320cdc55dc9c21e65aca1bfbe70b2b90529ae84abc51fa

kernel-debug-core-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 54b5aec67cfc39aedf90b7d949d5509e2970cd4805afb203bfb0a035ed81c0cd

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f021a3c613f179aea24c3447718b50df8191a1f7871d2fd04446923aac019f8e

kernel-debug-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f65b8c978431ccd8b8a35054bf493f543758e2be52c8c21f8dc8312ee3cbc054

kernel-debug-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 678049b5606bb6dbda60660ed65908909ea0444727b3fd4ef333a3d52545ec64

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 90207acfb3386ee50e11cb03f8691cf502b15fbd369c1f0f235b627296dfff8b

kernel-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: edf70ba36570e7c19431f9c1ed7cbbda1330871a54e147949f9229e6caf92241

kernel-debuginfo-common-ppc64le-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 96e9958c16577842b5886ac5dddd463288a0e6edd698e05cd59cbf8b0ebdddb7

kernel-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 0db901d570f83f187377caa6edde1e1d787ce3d1ffe9b782902fbc5a7605dc88

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: dd06709bb72dcd38e44f77f80603076bb70cacfafe5f37dd9f17218af2f6b41b

kernel-modules-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 6edf2cf19cfb7591a926783e796fc79494f3ce11b645ac0bfa13fc22d2ad448d

kernel-modules-extra-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: c3b440afe4b1accd4b5587f38daf7dfbca8141a4598c9956efaa7c684d4aa03d

kernel-tools-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 150890cfdf3c8a158a359a376e83a9117eee6de09dd491347b9b415ada35ef25

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: ee445e78ef7ada0f4fdace7c6f96e864d5cae6eac2d8bc20ce48c4e1bc1ad7fd

kernel-tools-libs-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b4b7b2eefa959ab5d06fcf16ba070e2e837d33b7e3970af839bea5b102616aa2

perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: b0075a839769eca86a898f7411102a24244282263390b3c8c2712ccd955da188

perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: cdd8e7a673071747f57f3e0f20cc2f6003aaf2f9d94c47d3505c0a7b710207ab

python3-perf-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f73700e2c00e800ae6ad754b37a7c1366550dcc1c251b65a94e75ea4d5f43830

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: bc522ffaab5ca8accbd2971074f0187071f5d7be02cbb8492b638318a4447694

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

x86_64

bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 339497d701832a3d28c3d517768a3fd317ed8a843c599ef3db030f184b575d31

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1504aaf806d0c900dc98fcb9fe4a41e1d93e8a87f7a6e152920fb470ef27069f

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 3f51330b99201d97f87f9034506132ae423a6c2bf817d7d20ad22d43e15e6190

kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: d958adcf4bc425fcc409b66dc06626194aa6598673f64aaa9163599720da6ae7

kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 89afa5294d47525d96041f336bcb67e0d7212d10fd1f6e3ad46336a4180a43d6

kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ac43a55e6f6b9075fbae51a5ade02eafceaeb1416b6079331d8b0a828332f513

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: af5507867218b0b2012a6f427b773965e534277beab16b67c937daac6883c1eb

kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7b3f302cd69f47e4233afe55094b907ee0f790c024e964f8380f51cfcda4a0b5

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: fed7204412da9c17e884df01d240ae10134884c18cfa7000fcab4484b612af7a

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 532a7be517f227c864fbfce21d234b3e2645645872b41c83d811f52d3f5a57f9

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ae41d2349fbffc530ef8718480a557fa9774a59326cbe2d9455a512135ca9622

kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 59fcde577610db98d4c12cd8744984c01999cf0abd84b478b5cceb4142d60a7b

kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 7a1a97300b04e55382f8522ad8cb4608c1c6f44d700ca38db802d55e0b20055a

kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 4bd017acb30dd3a9fc905f16756cb8905a8e20d8b9994e60a4510e1f91d3304d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 994dbfc990eb47da6437bde83b1e185b8a806100d4032bae83e3bfe9e0d85a07

perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 5c45859951c988c5faf48d7ad125ca121b8aa2075ebfbbdfe0243cfdf628ea8d

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 53b143093c33aa64f2e822b8513739264d194ee6b33f65b8736693c78897efed

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat CodeReady Linux Builder for x86_64 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: e3d07dd3ea8b8de0b64b51396c66d560ee91c13c18355cc5184a540784c213f3

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 639e4bb8ec54dc38aa4e88f1187cf3315e7ba0e479399c3bb23fd18060ef05b1

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f021a3c613f179aea24c3447718b50df8191a1f7871d2fd04446923aac019f8e

kernel-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: edf70ba36570e7c19431f9c1ed7cbbda1330871a54e147949f9229e6caf92241

kernel-debuginfo-common-ppc64le-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 96e9958c16577842b5886ac5dddd463288a0e6edd698e05cd59cbf8b0ebdddb7

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: ee445e78ef7ada0f4fdace7c6f96e864d5cae6eac2d8bc20ce48c4e1bc1ad7fd

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f9dcb5ca024a878936806ad6854749bc0a762d2c0f0057108fe6d4efce6929c2

perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: cdd8e7a673071747f57f3e0f20cc2f6003aaf2f9d94c47d3505c0a7b710207ab

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: bc522ffaab5ca8accbd2971074f0187071f5d7be02cbb8492b638318a4447694

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ec8b011c48df8bc8dee0b28e22436e2981acd919edee2bac8edc43493165e27b

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 80c3c42593f471b5fc5412a943e5ea8c31693e9f78337c68fe8c69ee0f2337f1

kernel-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 56dc8620c292bc4b2d1ebf090c6d2a4835815409f20ec9576aee72754f51f562

kernel-debuginfo-common-aarch64-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 7c5c184e118c1f1ea785bb0bca597d291bb46fe384df58b48896cd174a0ea04a

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f3e67bc7c238c09da5872b971f7ffdac0df7d438cc95d047b0092cdaf4918d2d

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 8d94e7aa40e87da38f75f28a18c0cef05f384127f5fbd8b517cb185b5ac80a56

perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92ab331458fbe0b32f6dccf7ac76c8c793c9208402d7cca5e38aff84c7617a27

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 2468691f982741b42e7cc00ce7c3a5f005a4a4be5b1ca334c18ddfa17210af29

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.19.1.el8_6.src.rpm

SHA-256: 4551015b0a31fc1c8d714a2af57736c462bdb2de8b8f1b3e9cf27230757ac89a

aarch64

bpftool-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ea4055a85fde63d53465ec7ff76e919a0f4a0ab282227009129e44b090d528a2

bpftool-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ec8b011c48df8bc8dee0b28e22436e2981acd919edee2bac8edc43493165e27b

kernel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f78aee8b2fcde52023e736bbf798aeb1704a77b277c6c73a8992a3b5c463225a

kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 4bacfe3e2418f914f37fd188154c1a161de449a94509ace80eb185287ce53b29

kernel-core-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 72002c2715ea70d3aebab42527c78531356d425589dbc82568410f64c4960c2b

kernel-cross-headers-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 785d9928678ad0b6f2e01623159969c3f64575a898d16fea2367ce331a9d2f8a

kernel-debug-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: fa6ffb5040f5d42b4ea1654e97dfa470ad13cdcde8ed384198473d0a78a7f588

kernel-debug-core-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 137e3ae779be781d188c6ae7b71a8000695bf92b77e84c9af9134122c371d7ba

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 80c3c42593f471b5fc5412a943e5ea8c31693e9f78337c68fe8c69ee0f2337f1

kernel-debug-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 6a9894e079c2647907b92bfb42b8d8561323c9fda819437a9c6342c75c8cf9f4

kernel-debug-modules-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 9d13c9aa921d65feaef0baaacf9320c0463b97aa7e686b9daaf288389e827bd0

kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: fd8ffe8c8c4bbe7255ee8eb951363d362747d30142f617750138ab1e0907434f

kernel-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 56dc8620c292bc4b2d1ebf090c6d2a4835815409f20ec9576aee72754f51f562

kernel-debuginfo-common-aarch64-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 7c5c184e118c1f1ea785bb0bca597d291bb46fe384df58b48896cd174a0ea04a

kernel-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 3b74bb341ed1d7390e24462f64dbba143a22a149730158bc78e2821326cb6563

kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm

SHA-256: 2c3c97f84fce88bda45e123cb8e64025fc60163a789ca377688f29f3fe021531

kernel-headers-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 863c6a50e3140f1edb625e8f54e904868a7fe8a9d83c7f26b3f07a1e4882c283

kernel-modules-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 6eae30b6edcb1be5ead175b6a80100ab74a49f3978c8e6013cdcff899e4fcbee

kernel-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 19a933062d5f52c320ac8aec8d2cda791a44964175a4ebb8f52570fe34474bb4

kernel-tools-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: eb2838bb875722e7f9802197c2ae896c0f10e2fcd797ab3b746adf34aed1ed1d

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f3e67bc7c238c09da5872b971f7ffdac0df7d438cc95d047b0092cdaf4918d2d

kernel-tools-libs-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 4939110a83ea087413f551b1bad2e1f7a8ca04ee9bc0679f253db8b887c14711

perf-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92f31b2bf096ef45196cef0014981332ddfeba0b29d779bea400ce26b28404db

perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92ab331458fbe0b32f6dccf7ac76c8c793c9208402d7cca5e38aff84c7617a27

python3-perf-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 935998390adbb5d23f4e3f38421e14def49c4bd323d34692a7716f2e66d78bf4

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 2468691f982741b42e7cc00ce7c3a5f005a4a4be5b1ca334c18ddfa17210af29

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: ec8737971436cb288633e706a75ba391c4b5b034d7c05c933244674ccdf12891

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 1139fa90ba660ea37489c0c3fbf245486b42e7e44cd6a2379ead048ffc604f53

kernel-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 31fa38e4a0b3e7ab1924046ef14f8806f9d7a968a2d67aa12f7e8076c612777a

kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 079e7dee504f1327ef582fa7fda9caab36f5edd9b99729d4747e68f10006bf06

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 72bd5c89564ba091ff561311eb179d8acae251ced6277fbb50dfc532f4933c69

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: e3d07dd3ea8b8de0b64b51396c66d560ee91c13c18355cc5184a540784c213f3

perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 862670985bd85ea677f3c15a454af2abdbd5c3240665991703f004ea0932bf8f

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.x86_64.rpm

SHA-256: 217d661574dbe609e8b52eab7c41126bbd8a8a9420d038e40169d170a39c5b6e

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 639e4bb8ec54dc38aa4e88f1187cf3315e7ba0e479399c3bb23fd18060ef05b1

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f021a3c613f179aea24c3447718b50df8191a1f7871d2fd04446923aac019f8e

kernel-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: edf70ba36570e7c19431f9c1ed7cbbda1330871a54e147949f9229e6caf92241

kernel-debuginfo-common-ppc64le-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: 96e9958c16577842b5886ac5dddd463288a0e6edd698e05cd59cbf8b0ebdddb7

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: ee445e78ef7ada0f4fdace7c6f96e864d5cae6eac2d8bc20ce48c4e1bc1ad7fd

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: f9dcb5ca024a878936806ad6854749bc0a762d2c0f0057108fe6d4efce6929c2

perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: cdd8e7a673071747f57f3e0f20cc2f6003aaf2f9d94c47d3505c0a7b710207ab

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.ppc64le.rpm

SHA-256: bc522ffaab5ca8accbd2971074f0187071f5d7be02cbb8492b638318a4447694

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: ec8b011c48df8bc8dee0b28e22436e2981acd919edee2bac8edc43493165e27b

kernel-debug-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 80c3c42593f471b5fc5412a943e5ea8c31693e9f78337c68fe8c69ee0f2337f1

kernel-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 56dc8620c292bc4b2d1ebf090c6d2a4835815409f20ec9576aee72754f51f562

kernel-debuginfo-common-aarch64-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 7c5c184e118c1f1ea785bb0bca597d291bb46fe384df58b48896cd174a0ea04a

kernel-tools-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: f3e67bc7c238c09da5872b971f7ffdac0df7d438cc95d047b0092cdaf4918d2d

kernel-tools-libs-devel-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 8d94e7aa40e87da38f75f28a18c0cef05f384127f5fbd8b517cb185b5ac80a56

perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 92ab331458fbe0b32f6dccf7ac76c8c793c9208402d7cca5e38aff84c7617a27

python3-perf-debuginfo-4.18.0-372.19.1.el8_6.aarch64.rpm

SHA-256: 2468691f982741b42e7cc00ce7c3a5f005a4a4be5b1ca334c18ddfa17210af29

Related news

September 2023: VM courses, Bahasa Indonesia, Russian Podcasts, Goodbye Tinkoff, MS Patch Tuesday, Qualys TOP 20, Linux, Forrester, GigaOm, R-Vision VM

Hello everyone! On the last day of September, I decided to record another retrospective episode on how my Vulnerability Management month went. Alternative video link (for Russia): https://vk.com/video-149273431_456239136 September was quite a busy month for me. Vulnerability Management courses I participated in two educational activities. The first one is an on-line cyber security course for […]

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Ubuntu Security Notice USN-5684-1

Ubuntu Security Notice 5684-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5660-1

Ubuntu Security Notice 5660-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5630-1

Ubuntu Security Notice 5630-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6551-01

Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...

RHSA-2022:6551: Red Hat Security Advisory: Red Hat Virtualization security update

An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Ubuntu Security Notice USN-5594-1

Ubuntu Security Notice 5594-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Red Hat Security Advisory 2022-6103-01

Red Hat Security Advisory 2022-6103-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.1.

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6051-01

Red Hat Security Advisory 2022-6051-01 - An update is now available for RHOL-5.5-RHEL-8. Issues addressed include denial of service, man-in-the-middle, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-6075-01

Red Hat Security Advisory 2022-6075-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:6075: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

CVE-2022-1012

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

Red Hat Security Advisory 2022-5806-01

Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5730-01

Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.

Red Hat Security Advisory 2022-5805-01

Red Hat Security Advisory 2022-5805-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5839: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5802: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5804: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5805: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

Red Hat Security Advisory 2022-5641-01

Red Hat Security Advisory 2022-5641-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5641: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5249: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overf...

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code