Headline
RHSA-2022:7110: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-0494: kernel: information leak in scsi_ioctl()
- CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
- CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
- CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed)
- CVE-2022-29900: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- CVE-2022-29901: hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
- Information leak in scsi_ioctl() (CVE-2022-0494)
- A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
- RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
- Branch Type Confusion (non-retbleed) (CVE-2022-23825)
- RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Add s390_iommu_aperture kernel parameter (BZ#2081324)
- Blackscreen and hangup after resume from hibernate or S3 with DFGX WX3200 (BZ#2091065)
- Update NVME subsystem with bug fixes and minor changes (BZ#2106017)
- Fix parsing of nw_proto for IPv6 fragments (BZ#2106703)
- “vmcore failed, _exitcode:139” error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107488)
- ‘disable_policy’ is ignored for addresses configured on a down interface (BZ#2109971)
- Backport request for new cpufreq.default_governor kernel command line parameter (BZ#2109996)
- Panics in mpt3sas mpt3sas_halt_firmware() if mpt3sas_fwfault_debug=1 enabled when poweroff issued to server (BZ#2111140)
- IOMMU/DMA update for 8.7 (BZ#2111692)
- Update Broadcom Emulex lpfc driver for RHEL8.7 with bug fixes (14.0.0.13) (BZ#2112103)
- Incorrect Socket(s) & “Core(s) per socket” reported by lscpu command. (BZ#2112820)
- Panic in ch_release() due to NULL ch->device pointer, backport upstream fix (BZ#2115965)
- pyverbs-tests fail over qede IW HCAs on “test_query_rc_qp” (tests.test_qp.QPTest) (BZ#2119122)
- qedi shutdown handler hangs upon reboot (BZ#2119847)
- cache link_info for ethtool (BZ#2120197)
- Important iavf bug fixes (BZ#2120225)
- Hibernate crash with Aquantia 2.5/5 Gb LAN card (BZ#2124966)
- While using PTimekeeper the qede driver produces excessive log messages (BZ#2125477)
- general protection fault handling rpc_xprt.timer (BZ#2126184)
- Not enough device MSI-X vectors (BZ#2126482)
- Atlantic driver panic on wakeup after hybernate (BZ#2127845)
- Memory leak in vxlan_xmit_one (BZ#2131255)
- Missing hybernate/resume fixes (BZ#2131936)
Enhancement(s):
- Update smartpqi driver to latest upstream Second Set of Patches (BZ#2112354)
- qed/qede/qedr - driver updates to latest upstream (BZ#2120611)
- Update qedi driver to latest upstream (BZ#2120612)
- Update qedf driver to latest upstream (BZ#2120613)
- Include the support for new NVIDIA Mobile GFX GA103 on ADL Gen Laptops (BZ#2127122)
- Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129923)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2039448 - CVE-2022-0494 kernel: information leak in scsi_ioctl()
- BZ - 2066819 - CVE-2022-1353 Kernel: A kernel-info-leak issue in pfkey_register
- BZ - 2090226 - CVE-2022-23816 CVE-2022-29900 hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- BZ - 2103148 - CVE-2022-29901 hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
- BZ - 2103153 - CVE-2022-23825 hw: cpu: AMD: Branch Type Confusion (non-retbleed)
- BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
CVEs
- CVE-2022-0494
- CVE-2022-1353
- CVE-2022-2588
- CVE-2022-23816
- CVE-2022-23825
- CVE-2022-29900
- CVE-2022-29901
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
x86_64
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 75d7f0d2074be4cb7171f9b4654393b17751eedf9d0f049d340e7408644a8d7d
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 64a07ccb659c5feded57dc8a576a11c97f00fa42041110cd39427ee735132be6
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e6d0b3265e541643d4708c8245d15d8e91e00dca565e95b3a1823ffaa6615713
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b8f2ba9211c5ca2c89de9a2915a65d282e863aa76063640668d874cc24ac1f85
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 889a2fea94471e3fbd7deb85539039edb06892376ada1efd6bc3700741cb1071
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 3a2e71400a12fd5b7643173c98632e9a624e05b932e6e92eb9ab21109e31d69a
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e4611b95135b130c793d5756cf0b6250014bde7187d7b87dde71407e3c9093f8
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 437e6fb4208cf214bdf572fe87f1888ddc05cd1c1ea8060d556df72927754b45
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 69dfaa3608f9f23a5f5608a7d0741287f163da75898604dba54bca64c206aa74
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e36aa155360e76dfd1a751ddebd07b358cc2d00036ff6d5d056de33126679bf3
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b3c5f8f566ffde8336a77791f6417f3d577caef3a132fb2f477179625525a19a
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8a638c3b42e3a560e13bf8840dfad4230a947515c92cfdd69101d323ffceaf9a
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e3a7ed06e981a1d1ca07c11deb1f2517af15fed75f5eb76bcfccd906c707968e
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: ef4613b5a0f71fed1c82ee1b833d7795faf9096696907b7c143b287b2bc50ab3
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
x86_64
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 75d7f0d2074be4cb7171f9b4654393b17751eedf9d0f049d340e7408644a8d7d
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 64a07ccb659c5feded57dc8a576a11c97f00fa42041110cd39427ee735132be6
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e6d0b3265e541643d4708c8245d15d8e91e00dca565e95b3a1823ffaa6615713
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b8f2ba9211c5ca2c89de9a2915a65d282e863aa76063640668d874cc24ac1f85
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 889a2fea94471e3fbd7deb85539039edb06892376ada1efd6bc3700741cb1071
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 3a2e71400a12fd5b7643173c98632e9a624e05b932e6e92eb9ab21109e31d69a
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e4611b95135b130c793d5756cf0b6250014bde7187d7b87dde71407e3c9093f8
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 437e6fb4208cf214bdf572fe87f1888ddc05cd1c1ea8060d556df72927754b45
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 69dfaa3608f9f23a5f5608a7d0741287f163da75898604dba54bca64c206aa74
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e36aa155360e76dfd1a751ddebd07b358cc2d00036ff6d5d056de33126679bf3
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b3c5f8f566ffde8336a77791f6417f3d577caef3a132fb2f477179625525a19a
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8a638c3b42e3a560e13bf8840dfad4230a947515c92cfdd69101d323ffceaf9a
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e3a7ed06e981a1d1ca07c11deb1f2517af15fed75f5eb76bcfccd906c707968e
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: ef4613b5a0f71fed1c82ee1b833d7795faf9096696907b7c143b287b2bc50ab3
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
s390x
bpftool-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e1f4f49582abb43fede1bca62c6046cf03abe3cf2d72d2b9b722dfb296880d83
bpftool-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 74180d7f6d22b9531aedabbfb629cf8118899643e3cd3ea9ea054c03a9ec1b70
kernel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 1a3ab6d4edbc52e55a845ad57ebc1f6e9cdbad370c3490df4c3bdde860cd68c8
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 83da8f084cc1aa01f90458e076f3e5d7bdd1e2b99bf521762ba303df993b50ef
kernel-cross-headers-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 831f868fd15f9371aa6f12db4dc36d4729949ecde8e0e175eaa2175a23012793
kernel-debug-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 3d81a6cd86f94fdc4c7e36912d11dddfa3a2ec92acc6951f3b7f8ab710afd55c
kernel-debug-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 07b33e52caa129eef5e3e9dc662fff93da126ae34a3012261d621080978c318b
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 50491baeddaa5c3cfb61e0ed79bd94bfd2ac0c91459ec2b2f55c0b3a0b2e7991
kernel-debug-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 20ed18b39a8877e11b8a9aea77de205f177544ed1c5f695205b94c77a0863ebe
kernel-debug-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 28643f10396fc09de56936ac18914bff33486f8323d8d69eb3de646ac7aa31cc
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0ff90d462b60821af7b3ef3b95cf8196302ad2f0742ab1225e96e754c453758a
kernel-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 784d51427cfa3279e35bde01ea9fa57e62a39bdf7e10c0cf2bce577d645b4140
kernel-debuginfo-common-s390x-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 534110ad0257cee68cc6c367f2db53b26b887a480713b787f02e9cfb8ba7fb7d
kernel-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 7a810b148fb63d726341191d2f92b282ee71c34cf03a6f6593a7cfb14c387005
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: cdacca057d9f243126abe11a51da77aa9e53e30ff5cbe053080764022147fee0
kernel-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e89ebf528d5693584d9e1d4d0fece20e5c6db4a23ceceb6dd2fbfd979c2b36f4
kernel-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: d7ead70534bfe15852669b8e09f83cabe22a5062088fb37e0ce8dae7693de920
kernel-tools-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 37a468c5193cd36822fec3b95e7d5596095caed35223e338fc47200b761986e6
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 070d5ad31423bd57c397732e6db142cd1bef7632a252fe755d39129b91403454
kernel-zfcpdump-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0f6a717488694af7bf778b12f246c7706ee2d2ade6935230885e652a1d7d911a
kernel-zfcpdump-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e9b477c4013821ba7d795f3129e4c670870f3f86d287749afa18f0f8d31c4d0c
kernel-zfcpdump-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0d166feba881d41694b50184c1cbc65e63f15d2752d4018518bee52c69cbd611
kernel-zfcpdump-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 34f82ed0898c801633945a2387d64a018f43220ed9928a7e5836e3c0cd5158f7
kernel-zfcpdump-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: bdcf82c34344d01c255e6eb3c16fc999563bbe44e408a985935b2b1234f30e5b
kernel-zfcpdump-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: fc7c5b49987f7069e510f6e09ae0733befa501c3e76543cf2d6e924ddcb7497b
perf-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 48a2c0a983d37a834b4ad6b18b24bcf25690fc0b6a9ff329b938db1de1ed0d91
perf-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: a934a7d19c9aa69a7d2ca7f63173489fb89614cee480568e59de05692db8cd08
python3-perf-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 8c28514fe3df2b09cb9caa8463aad7832963fd03da26c21583c9a091fa2810a9
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: d7589a24681901eb0e9622a922cbed6701b930764e9c50061f6eb5735950f9fb
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
s390x
bpftool-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e1f4f49582abb43fede1bca62c6046cf03abe3cf2d72d2b9b722dfb296880d83
bpftool-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 74180d7f6d22b9531aedabbfb629cf8118899643e3cd3ea9ea054c03a9ec1b70
kernel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 1a3ab6d4edbc52e55a845ad57ebc1f6e9cdbad370c3490df4c3bdde860cd68c8
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 83da8f084cc1aa01f90458e076f3e5d7bdd1e2b99bf521762ba303df993b50ef
kernel-cross-headers-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 831f868fd15f9371aa6f12db4dc36d4729949ecde8e0e175eaa2175a23012793
kernel-debug-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 3d81a6cd86f94fdc4c7e36912d11dddfa3a2ec92acc6951f3b7f8ab710afd55c
kernel-debug-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 07b33e52caa129eef5e3e9dc662fff93da126ae34a3012261d621080978c318b
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 50491baeddaa5c3cfb61e0ed79bd94bfd2ac0c91459ec2b2f55c0b3a0b2e7991
kernel-debug-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 20ed18b39a8877e11b8a9aea77de205f177544ed1c5f695205b94c77a0863ebe
kernel-debug-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 28643f10396fc09de56936ac18914bff33486f8323d8d69eb3de646ac7aa31cc
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0ff90d462b60821af7b3ef3b95cf8196302ad2f0742ab1225e96e754c453758a
kernel-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 784d51427cfa3279e35bde01ea9fa57e62a39bdf7e10c0cf2bce577d645b4140
kernel-debuginfo-common-s390x-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 534110ad0257cee68cc6c367f2db53b26b887a480713b787f02e9cfb8ba7fb7d
kernel-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 7a810b148fb63d726341191d2f92b282ee71c34cf03a6f6593a7cfb14c387005
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: cdacca057d9f243126abe11a51da77aa9e53e30ff5cbe053080764022147fee0
kernel-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e89ebf528d5693584d9e1d4d0fece20e5c6db4a23ceceb6dd2fbfd979c2b36f4
kernel-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: d7ead70534bfe15852669b8e09f83cabe22a5062088fb37e0ce8dae7693de920
kernel-tools-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 37a468c5193cd36822fec3b95e7d5596095caed35223e338fc47200b761986e6
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 070d5ad31423bd57c397732e6db142cd1bef7632a252fe755d39129b91403454
kernel-zfcpdump-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0f6a717488694af7bf778b12f246c7706ee2d2ade6935230885e652a1d7d911a
kernel-zfcpdump-core-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: e9b477c4013821ba7d795f3129e4c670870f3f86d287749afa18f0f8d31c4d0c
kernel-zfcpdump-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 0d166feba881d41694b50184c1cbc65e63f15d2752d4018518bee52c69cbd611
kernel-zfcpdump-devel-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 34f82ed0898c801633945a2387d64a018f43220ed9928a7e5836e3c0cd5158f7
kernel-zfcpdump-modules-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: bdcf82c34344d01c255e6eb3c16fc999563bbe44e408a985935b2b1234f30e5b
kernel-zfcpdump-modules-extra-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: fc7c5b49987f7069e510f6e09ae0733befa501c3e76543cf2d6e924ddcb7497b
perf-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 48a2c0a983d37a834b4ad6b18b24bcf25690fc0b6a9ff329b938db1de1ed0d91
perf-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: a934a7d19c9aa69a7d2ca7f63173489fb89614cee480568e59de05692db8cd08
python3-perf-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: 8c28514fe3df2b09cb9caa8463aad7832963fd03da26c21583c9a091fa2810a9
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.s390x.rpm
SHA-256: d7589a24681901eb0e9622a922cbed6701b930764e9c50061f6eb5735950f9fb
Red Hat Enterprise Linux for Power, little endian 8
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
ppc64le
bpftool-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2e1733cc337d50fbd7db81bb10908e2753ca9f8d85c2dcff75f208b370e4848c
bpftool-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: a315d4b5737928f64d5bdc411cb3ef84c6685e273040b41576ee28f2efbac8f8
kernel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3a9aa58228e20895d687982bd78359a8a6ee5507c447968666e1cb418cea6540
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: eef2a65e410cdedd3b09d6ed2475481289999b3f69e013215c29aefe555eff77
kernel-cross-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 98a6f811628cc49426f205fd2ab861b20dc9d80b703903f14675f88f1d3a28df
kernel-debug-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 63ecab22ec38db5d5e68490525fe5ed512cc04656bbddc144da140d9321737d0
kernel-debug-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6302eb6384ce2df2b03603c80daa33c18981afde5cdecddfc0366bd8e00169d6
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 999668f1e332241eb1b7121196e37aad971edb02f7a741b86333321e8bb20534
kernel-debug-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 8212b9c0b33a97d1e25c5a34702d0b1c9b6a31b90afe34a213705f921f9d6c89
kernel-debug-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e720b0d94fef880d7eea3034f9c6692fd74a02899df49c500cf7c8facca8fef2
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 31a7be8df02ce4bcd329b640587c947837821464be0dc54db99815f874b4d7bd
kernel-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 9cee11c72fdf317e43dafec6c675c394e0494b3d83919b9b45c2675ed0be64b8
kernel-debuginfo-common-ppc64le-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 21304b65c6a99b0804415b5b11231302baf965c917b8de84e9ac6d0c9bad78f3
kernel-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 14fc41b1179b34b8c938c20a4af6f52cd634c65596970ce7823dff658279ee4b
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 59713579532de665b82db4209b9795178c79ab281079b79c1f9697cafca303ee
kernel-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3439b2dc6b1b5a9af525cc5aa75f9a0fb4c5a6304abc6358663f875f4e23be70
kernel-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2580d86d50bb7f3f56dd0086cd978755dc7a89ed501b8c4f854ac19ad0455410
kernel-tools-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e7eff73b5079b045ffa0df4e87fb0fd1580a1e234afae7057ad48d315cda971f
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2a2c68567c317d9904d54d12d9c56c1be8f1670137f6cee8c07c93f583186be4
kernel-tools-libs-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6e3dd46dd2f2efc60a0c4a53ced96659c8cd780061d298bf39730bd2b1004fe5
perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 491f196b0627dea7f4f0d3ebc27b6ee4f9b158c35fbbb2afe2b319f8cc865e49
perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 74e4ba7c505f42e8548366c940f26f708eca03a53f8f47e178ea48aba58fab92
python3-perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 0d5e153829d82f91b944abd4e4c1256e8085cb627d5302da340db46b460e7ace
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: ae74dc51fce006996af1bfa0ae672ab97b52ef958f362ffcb2a78a3748e24667
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
ppc64le
bpftool-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2e1733cc337d50fbd7db81bb10908e2753ca9f8d85c2dcff75f208b370e4848c
bpftool-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: a315d4b5737928f64d5bdc411cb3ef84c6685e273040b41576ee28f2efbac8f8
kernel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3a9aa58228e20895d687982bd78359a8a6ee5507c447968666e1cb418cea6540
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: eef2a65e410cdedd3b09d6ed2475481289999b3f69e013215c29aefe555eff77
kernel-cross-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 98a6f811628cc49426f205fd2ab861b20dc9d80b703903f14675f88f1d3a28df
kernel-debug-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 63ecab22ec38db5d5e68490525fe5ed512cc04656bbddc144da140d9321737d0
kernel-debug-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6302eb6384ce2df2b03603c80daa33c18981afde5cdecddfc0366bd8e00169d6
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 999668f1e332241eb1b7121196e37aad971edb02f7a741b86333321e8bb20534
kernel-debug-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 8212b9c0b33a97d1e25c5a34702d0b1c9b6a31b90afe34a213705f921f9d6c89
kernel-debug-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e720b0d94fef880d7eea3034f9c6692fd74a02899df49c500cf7c8facca8fef2
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 31a7be8df02ce4bcd329b640587c947837821464be0dc54db99815f874b4d7bd
kernel-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 9cee11c72fdf317e43dafec6c675c394e0494b3d83919b9b45c2675ed0be64b8
kernel-debuginfo-common-ppc64le-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 21304b65c6a99b0804415b5b11231302baf965c917b8de84e9ac6d0c9bad78f3
kernel-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 14fc41b1179b34b8c938c20a4af6f52cd634c65596970ce7823dff658279ee4b
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 59713579532de665b82db4209b9795178c79ab281079b79c1f9697cafca303ee
kernel-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3439b2dc6b1b5a9af525cc5aa75f9a0fb4c5a6304abc6358663f875f4e23be70
kernel-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2580d86d50bb7f3f56dd0086cd978755dc7a89ed501b8c4f854ac19ad0455410
kernel-tools-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e7eff73b5079b045ffa0df4e87fb0fd1580a1e234afae7057ad48d315cda971f
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2a2c68567c317d9904d54d12d9c56c1be8f1670137f6cee8c07c93f583186be4
kernel-tools-libs-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6e3dd46dd2f2efc60a0c4a53ced96659c8cd780061d298bf39730bd2b1004fe5
perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 491f196b0627dea7f4f0d3ebc27b6ee4f9b158c35fbbb2afe2b319f8cc865e49
perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 74e4ba7c505f42e8548366c940f26f708eca03a53f8f47e178ea48aba58fab92
python3-perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 0d5e153829d82f91b944abd4e4c1256e8085cb627d5302da340db46b460e7ace
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: ae74dc51fce006996af1bfa0ae672ab97b52ef958f362ffcb2a78a3748e24667
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat Enterprise Linux for x86_64 8
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
x86_64
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 75d7f0d2074be4cb7171f9b4654393b17751eedf9d0f049d340e7408644a8d7d
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 64a07ccb659c5feded57dc8a576a11c97f00fa42041110cd39427ee735132be6
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e6d0b3265e541643d4708c8245d15d8e91e00dca565e95b3a1823ffaa6615713
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b8f2ba9211c5ca2c89de9a2915a65d282e863aa76063640668d874cc24ac1f85
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 889a2fea94471e3fbd7deb85539039edb06892376ada1efd6bc3700741cb1071
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 3a2e71400a12fd5b7643173c98632e9a624e05b932e6e92eb9ab21109e31d69a
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e4611b95135b130c793d5756cf0b6250014bde7187d7b87dde71407e3c9093f8
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 437e6fb4208cf214bdf572fe87f1888ddc05cd1c1ea8060d556df72927754b45
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 69dfaa3608f9f23a5f5608a7d0741287f163da75898604dba54bca64c206aa74
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e36aa155360e76dfd1a751ddebd07b358cc2d00036ff6d5d056de33126679bf3
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b3c5f8f566ffde8336a77791f6417f3d577caef3a132fb2f477179625525a19a
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8a638c3b42e3a560e13bf8840dfad4230a947515c92cfdd69101d323ffceaf9a
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e3a7ed06e981a1d1ca07c11deb1f2517af15fed75f5eb76bcfccd906c707968e
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: ef4613b5a0f71fed1c82ee1b833d7795faf9096696907b7c143b287b2bc50ab3
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
x86_64
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 75d7f0d2074be4cb7171f9b4654393b17751eedf9d0f049d340e7408644a8d7d
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 64a07ccb659c5feded57dc8a576a11c97f00fa42041110cd39427ee735132be6
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e6d0b3265e541643d4708c8245d15d8e91e00dca565e95b3a1823ffaa6615713
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b8f2ba9211c5ca2c89de9a2915a65d282e863aa76063640668d874cc24ac1f85
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 889a2fea94471e3fbd7deb85539039edb06892376ada1efd6bc3700741cb1071
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 3a2e71400a12fd5b7643173c98632e9a624e05b932e6e92eb9ab21109e31d69a
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e4611b95135b130c793d5756cf0b6250014bde7187d7b87dde71407e3c9093f8
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 437e6fb4208cf214bdf572fe87f1888ddc05cd1c1ea8060d556df72927754b45
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 69dfaa3608f9f23a5f5608a7d0741287f163da75898604dba54bca64c206aa74
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e36aa155360e76dfd1a751ddebd07b358cc2d00036ff6d5d056de33126679bf3
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b3c5f8f566ffde8336a77791f6417f3d577caef3a132fb2f477179625525a19a
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8a638c3b42e3a560e13bf8840dfad4230a947515c92cfdd69101d323ffceaf9a
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e3a7ed06e981a1d1ca07c11deb1f2517af15fed75f5eb76bcfccd906c707968e
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: ef4613b5a0f71fed1c82ee1b833d7795faf9096696907b7c143b287b2bc50ab3
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat Enterprise Linux for ARM 64 8
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
aarch64
bpftool-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 12b3882971dd62c2a1a711f01db677968938b28edbd1ba2b6af0dc20e5784ea8
bpftool-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f63863b19fcc017f7509b14a21c7d68b0679e7c48cb6c167f870331f2e0b8aee
kernel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 98dd8e4d63ab9008135a5f65a89686781b36db7f49c87c150a587ecfc4bc15cf
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8f3eacb6918acc31bc80eb0f7f4cef8c220d324c1d014d131f712929fb5dd837
kernel-cross-headers-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ca3914d3ebcde6aab1a41498d3956dc492cf55d14e3888dd498f83c5b7188e91
kernel-debug-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: daf9c2093b9c40d3980dfb705abfe2052161ac4f6680301bc697e748751bdfea
kernel-debug-core-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f11f102fec785fe220e475843c6248255474004e35d4df307e77a14166c75f78
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e080d5223843f228988e35b5ce48c4fba828a4ad12a9a5ff671006b8208819a7
kernel-debug-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8d6b1f5143a9dd17c810b03222d2943d96632628684f6720ff07cfe1fc9410c9
kernel-debug-modules-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 6317059acfda1344a8f2081dead2913d31848287a8cc0344ebc1b1aed9fcbe7c
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c6c1d395db63d9046dfe11f86b8e1fc0a7d459717f13efe8ba18c3fdfad494fa
kernel-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: b7914a56a8e65a7799b7b7328dec08368dee4e191b4942eb60010e39b40f64bb
kernel-debuginfo-common-aarch64-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ec0c5abbee10df01617b6cf7fb19c3c99e8c430754ba22d5b0fc40f4bae73ee8
kernel-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 9089bda0bb818a4a704305afc2f0442f40b3debf7a2d26db1d2b7f24127611a2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 37d05e4deb9c2a70ecdfc33719093d285db33a89fb3d5c8b6441f1daf94b1db6
kernel-modules-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c61daee310b89d9a330aa49caa9604f1d5a404f37e2cfcea4b5b33b0077d489d
kernel-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e0c13a2271a07c9326a179f6c846c933549408c5bbc1184f05176c27cd68490d
kernel-tools-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c96a391e10744c6663aa3f0d8ba586fcf837dd2d5667f2b258af280abdc50cb5
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 20a325e65a92fe9564bb481d4afa885da08448b46bdbccc61a7f5a75a485f08a
kernel-tools-libs-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 4ac030b196dc3e0d9df028394f765c806f5629b886b5427e110ce5687d658538
perf-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 0976010311650774b0dd7d73f6982d706125ac3837e8d5f6b49a30676ecb080a
perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 5dcf14f9a33e3fbfdf96b73a62b161891bc7f1b3c4a6bf5bfed8044761c88e8d
python3-perf-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8fda7579b026c7dc5a6c20814e4795c201d2570229188a1dd00c6afc51577169
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 504e1316f68bf1a9aefad350be077acefe9e50f9c65c481576edd88f683c9565
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
ppc64le
bpftool-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2e1733cc337d50fbd7db81bb10908e2753ca9f8d85c2dcff75f208b370e4848c
bpftool-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: a315d4b5737928f64d5bdc411cb3ef84c6685e273040b41576ee28f2efbac8f8
kernel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3a9aa58228e20895d687982bd78359a8a6ee5507c447968666e1cb418cea6540
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: eef2a65e410cdedd3b09d6ed2475481289999b3f69e013215c29aefe555eff77
kernel-cross-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 98a6f811628cc49426f205fd2ab861b20dc9d80b703903f14675f88f1d3a28df
kernel-debug-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 63ecab22ec38db5d5e68490525fe5ed512cc04656bbddc144da140d9321737d0
kernel-debug-core-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6302eb6384ce2df2b03603c80daa33c18981afde5cdecddfc0366bd8e00169d6
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 999668f1e332241eb1b7121196e37aad971edb02f7a741b86333321e8bb20534
kernel-debug-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 8212b9c0b33a97d1e25c5a34702d0b1c9b6a31b90afe34a213705f921f9d6c89
kernel-debug-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e720b0d94fef880d7eea3034f9c6692fd74a02899df49c500cf7c8facca8fef2
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 31a7be8df02ce4bcd329b640587c947837821464be0dc54db99815f874b4d7bd
kernel-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 9cee11c72fdf317e43dafec6c675c394e0494b3d83919b9b45c2675ed0be64b8
kernel-debuginfo-common-ppc64le-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 21304b65c6a99b0804415b5b11231302baf965c917b8de84e9ac6d0c9bad78f3
kernel-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 14fc41b1179b34b8c938c20a4af6f52cd634c65596970ce7823dff658279ee4b
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 59713579532de665b82db4209b9795178c79ab281079b79c1f9697cafca303ee
kernel-modules-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 3439b2dc6b1b5a9af525cc5aa75f9a0fb4c5a6304abc6358663f875f4e23be70
kernel-modules-extra-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2580d86d50bb7f3f56dd0086cd978755dc7a89ed501b8c4f854ac19ad0455410
kernel-tools-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: e7eff73b5079b045ffa0df4e87fb0fd1580a1e234afae7057ad48d315cda971f
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2a2c68567c317d9904d54d12d9c56c1be8f1670137f6cee8c07c93f583186be4
kernel-tools-libs-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 6e3dd46dd2f2efc60a0c4a53ced96659c8cd780061d298bf39730bd2b1004fe5
perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 491f196b0627dea7f4f0d3ebc27b6ee4f9b158c35fbbb2afe2b319f8cc865e49
perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 74e4ba7c505f42e8548366c940f26f708eca03a53f8f47e178ea48aba58fab92
python3-perf-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 0d5e153829d82f91b944abd4e4c1256e8085cb627d5302da340db46b460e7ace
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: ae74dc51fce006996af1bfa0ae672ab97b52ef958f362ffcb2a78a3748e24667
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
x86_64
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 75d7f0d2074be4cb7171f9b4654393b17751eedf9d0f049d340e7408644a8d7d
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 64a07ccb659c5feded57dc8a576a11c97f00fa42041110cd39427ee735132be6
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e6d0b3265e541643d4708c8245d15d8e91e00dca565e95b3a1823ffaa6615713
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b8f2ba9211c5ca2c89de9a2915a65d282e863aa76063640668d874cc24ac1f85
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 889a2fea94471e3fbd7deb85539039edb06892376ada1efd6bc3700741cb1071
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 3a2e71400a12fd5b7643173c98632e9a624e05b932e6e92eb9ab21109e31d69a
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e4611b95135b130c793d5756cf0b6250014bde7187d7b87dde71407e3c9093f8
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 437e6fb4208cf214bdf572fe87f1888ddc05cd1c1ea8060d556df72927754b45
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 69dfaa3608f9f23a5f5608a7d0741287f163da75898604dba54bca64c206aa74
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25f5ecaf6f5d74f40529e521fdfbf6d354e89583904d66b1301fcd978460b0c2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0c8048dba792693e5aed1a143b6499585fd53a1f758ed3eee1ce222e8e1d7d45
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e36aa155360e76dfd1a751ddebd07b358cc2d00036ff6d5d056de33126679bf3
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b3c5f8f566ffde8336a77791f6417f3d577caef3a132fb2f477179625525a19a
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8a638c3b42e3a560e13bf8840dfad4230a947515c92cfdd69101d323ffceaf9a
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: e3a7ed06e981a1d1ca07c11deb1f2517af15fed75f5eb76bcfccd906c707968e
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 25a56cbd1f4c77719a25bf65344846021c338fc167c7cfd297852831f0b6445b
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: ef4613b5a0f71fed1c82ee1b833d7795faf9096696907b7c143b287b2bc50ab3
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8f643eac11071e81cfa5ec5e2e45fac7c2182ac6638b58fd09dbba02353b7033
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: a315d4b5737928f64d5bdc411cb3ef84c6685e273040b41576ee28f2efbac8f8
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 999668f1e332241eb1b7121196e37aad971edb02f7a741b86333321e8bb20534
kernel-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 9cee11c72fdf317e43dafec6c675c394e0494b3d83919b9b45c2675ed0be64b8
kernel-debuginfo-common-ppc64le-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 21304b65c6a99b0804415b5b11231302baf965c917b8de84e9ac6d0c9bad78f3
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2a2c68567c317d9904d54d12d9c56c1be8f1670137f6cee8c07c93f583186be4
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 1a44e66cd4d0c8f8675741bcf664c6fcff2089aa6c116ec8c757163ba1d36d3d
perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 74e4ba7c505f42e8548366c940f26f708eca03a53f8f47e178ea48aba58fab92
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: ae74dc51fce006996af1bfa0ae672ab97b52ef958f362ffcb2a78a3748e24667
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f63863b19fcc017f7509b14a21c7d68b0679e7c48cb6c167f870331f2e0b8aee
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e080d5223843f228988e35b5ce48c4fba828a4ad12a9a5ff671006b8208819a7
kernel-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: b7914a56a8e65a7799b7b7328dec08368dee4e191b4942eb60010e39b40f64bb
kernel-debuginfo-common-aarch64-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ec0c5abbee10df01617b6cf7fb19c3c99e8c430754ba22d5b0fc40f4bae73ee8
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 20a325e65a92fe9564bb481d4afa885da08448b46bdbccc61a7f5a75a485f08a
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 0a4207032321ba36b76026b643750001ad5a0a56db6d928bd91eb5b479f1bc77
perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 5dcf14f9a33e3fbfdf96b73a62b161891bc7f1b3c4a6bf5bfed8044761c88e8d
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 504e1316f68bf1a9aefad350be077acefe9e50f9c65c481576edd88f683c9565
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.32.1.el8_6.src.rpm
SHA-256: 3dd0549eb435eba42f85b71d58b5779f2233bbfa0d4c88e23c0c37be7f7d6aba
aarch64
bpftool-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 12b3882971dd62c2a1a711f01db677968938b28edbd1ba2b6af0dc20e5784ea8
bpftool-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f63863b19fcc017f7509b14a21c7d68b0679e7c48cb6c167f870331f2e0b8aee
kernel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 98dd8e4d63ab9008135a5f65a89686781b36db7f49c87c150a587ecfc4bc15cf
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 033fb1d29f5a1db6217290f445cba78d48df0553b11ac271b6a583fd7086216d
kernel-core-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8f3eacb6918acc31bc80eb0f7f4cef8c220d324c1d014d131f712929fb5dd837
kernel-cross-headers-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ca3914d3ebcde6aab1a41498d3956dc492cf55d14e3888dd498f83c5b7188e91
kernel-debug-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: daf9c2093b9c40d3980dfb705abfe2052161ac4f6680301bc697e748751bdfea
kernel-debug-core-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f11f102fec785fe220e475843c6248255474004e35d4df307e77a14166c75f78
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e080d5223843f228988e35b5ce48c4fba828a4ad12a9a5ff671006b8208819a7
kernel-debug-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8d6b1f5143a9dd17c810b03222d2943d96632628684f6720ff07cfe1fc9410c9
kernel-debug-modules-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 6317059acfda1344a8f2081dead2913d31848287a8cc0344ebc1b1aed9fcbe7c
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c6c1d395db63d9046dfe11f86b8e1fc0a7d459717f13efe8ba18c3fdfad494fa
kernel-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: b7914a56a8e65a7799b7b7328dec08368dee4e191b4942eb60010e39b40f64bb
kernel-debuginfo-common-aarch64-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ec0c5abbee10df01617b6cf7fb19c3c99e8c430754ba22d5b0fc40f4bae73ee8
kernel-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 9089bda0bb818a4a704305afc2f0442f40b3debf7a2d26db1d2b7f24127611a2
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
SHA-256: 314bb197d5557fa35d611955a27802432fd329dbe0ed9fc1d24a578a5d2b2664
kernel-headers-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 37d05e4deb9c2a70ecdfc33719093d285db33a89fb3d5c8b6441f1daf94b1db6
kernel-modules-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c61daee310b89d9a330aa49caa9604f1d5a404f37e2cfcea4b5b33b0077d489d
kernel-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e0c13a2271a07c9326a179f6c846c933549408c5bbc1184f05176c27cd68490d
kernel-tools-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: c96a391e10744c6663aa3f0d8ba586fcf837dd2d5667f2b258af280abdc50cb5
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 20a325e65a92fe9564bb481d4afa885da08448b46bdbccc61a7f5a75a485f08a
kernel-tools-libs-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 4ac030b196dc3e0d9df028394f765c806f5629b886b5427e110ce5687d658538
perf-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 0976010311650774b0dd7d73f6982d706125ac3837e8d5f6b49a30676ecb080a
perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 5dcf14f9a33e3fbfdf96b73a62b161891bc7f1b3c4a6bf5bfed8044761c88e8d
python3-perf-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 8fda7579b026c7dc5a6c20814e4795c201d2570229188a1dd00c6afc51577169
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 504e1316f68bf1a9aefad350be077acefe9e50f9c65c481576edd88f683c9565
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 13773dddb7a6c29d4a8725daec15c7c8e8d530f666702124cb3c29e259568495
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 257c27a130a4c97f9c4a3079f93f6da512132748c9ddf85b833a78421af661ab
kernel-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 0259e1b365b49df8544e2614ff8e228f2335faad9b68fe81a6a22bd5539d1157
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: a622a261d2033fb9fba622dc6adb7e0ac8382ec21a3485bbcb9996bf83d33874
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 719827640676c5883bd21cc060df4517c30e5f7ca381d217d3099cf9726a3f1c
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: 8f643eac11071e81cfa5ec5e2e45fac7c2182ac6638b58fd09dbba02353b7033
perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: b69948aef688c65cf146de64816a762a9beb2f2a4ac1cc9a243972dffb529fff
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.x86_64.rpm
SHA-256: f4e912461e96284026313a3103360ceba3499cae84b7f5882e3d9efdb5fff095
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: a315d4b5737928f64d5bdc411cb3ef84c6685e273040b41576ee28f2efbac8f8
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 999668f1e332241eb1b7121196e37aad971edb02f7a741b86333321e8bb20534
kernel-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 9cee11c72fdf317e43dafec6c675c394e0494b3d83919b9b45c2675ed0be64b8
kernel-debuginfo-common-ppc64le-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 21304b65c6a99b0804415b5b11231302baf965c917b8de84e9ac6d0c9bad78f3
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 2a2c68567c317d9904d54d12d9c56c1be8f1670137f6cee8c07c93f583186be4
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 1a44e66cd4d0c8f8675741bcf664c6fcff2089aa6c116ec8c757163ba1d36d3d
perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: 74e4ba7c505f42e8548366c940f26f708eca03a53f8f47e178ea48aba58fab92
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.ppc64le.rpm
SHA-256: ae74dc51fce006996af1bfa0ae672ab97b52ef958f362ffcb2a78a3748e24667
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: f63863b19fcc017f7509b14a21c7d68b0679e7c48cb6c167f870331f2e0b8aee
kernel-debug-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: e080d5223843f228988e35b5ce48c4fba828a4ad12a9a5ff671006b8208819a7
kernel-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: b7914a56a8e65a7799b7b7328dec08368dee4e191b4942eb60010e39b40f64bb
kernel-debuginfo-common-aarch64-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: ec0c5abbee10df01617b6cf7fb19c3c99e8c430754ba22d5b0fc40f4bae73ee8
kernel-tools-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 20a325e65a92fe9564bb481d4afa885da08448b46bdbccc61a7f5a75a485f08a
kernel-tools-libs-devel-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 0a4207032321ba36b76026b643750001ad5a0a56db6d928bd91eb5b479f1bc77
perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 5dcf14f9a33e3fbfdf96b73a62b161891bc7f1b3c4a6bf5bfed8044761c88e8d
python3-perf-debuginfo-4.18.0-372.32.1.el8_6.aarch64.rpm
SHA-256: 504e1316f68bf1a9aefad350be077acefe9e50f9c65c481576edd88f683c9565
Related news
Gentoo Linux Security Advisory 202402-7 - Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. Versions greater than or equal to 4.16.6_pre1 are affected.
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. Called Collide+Power (CVE-2023-20583), Downfall (CVE-2022-40982), and Inception (CVE-2023-20569), the novel methods follow the disclosure of another newly discovered security vulnerability affecting AMD's Zen 2 architecture-based processors known as
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a l...
Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Security vendors urge organizations to fix the actively exploited bugs, in Microsoft Outlook and the Mark of the Web feature, immediately.
Ubuntu Security Notice 5862-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Ubuntu Security Notice 5861-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5854-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...
Ubuntu Security Notice 5728-3 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-8609-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.9.7 images. Issues addressed include a bypass vulnerability.
Ubuntu Security Notice 5728-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-0854: ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...
Red Hat Security Advisory 2022-7434-01 - A Red Hat OpenShift security update has been provided for the Logging Subsystem.
Red Hat Security Advisory 2022-6882-01 - Openshift Logging 5.3.13 security and bug fix release.
An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * ...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu: AMD: Branch Type Confusion (non-retbleed) * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions * CVE...
Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2022-7276-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include denial of service, server-side request forgery, and remote SQL injection vulnerabilities.
Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2238: search-api: SQL injection leads to remote denial of service * CVE-2022-25858: terser: insecure use of regular expressions leads to ReDoS * CVE-2022-25887: sanitize-html: insecure global regular expression replacement logic may lead to ReDoS * CVE-2022-25896: passport: incorrect ses...
Red Hat OpenShift Container Platform release 4.11.12 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)
Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General Availability release images, which fix security issues. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2238: search-api: SQL injection leads to remote denial of service * CVE-2022-25858: terser: insecure use of regular expressions leads to ReDoS * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-35948: nodejs: undici vulnerable to CRLF via content headers * CVE-2022-35949: n...
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka S...
Red Hat Security Advisory 2022-7171-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7137-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7110-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45485: kernel: information leak in the IPv6 implementation * CVE-2021-45486: kernel: information leak in the IPv4 implementation * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CV...
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete clea...
Red Hat Security Advisory 2022-6681-01 - Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important.
Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1798: kubeVirt: Arbitrary file read on the host from KubeVirt VMs
Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1798: kubeVirt: Arbitrary file read on the host from KubeVirt VMs
An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...
Red Hat Security Advisory 2022-6308-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.8.49. There are no RPMs for this release. Space precludes documenting all of the container images in this advisory. Issues addressed include bypass and code execution vulnerabilities.
Red Hat OpenShift Container Platform release 4.8.49 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (is...
Red Hat Security Advisory 2022-6322-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.59. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2022-6322-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.59. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 4.7.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-6262-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 4.6.61 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.
Red Hat OpenShift Container Platform release 4.10.31 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)
Red Hat OpenShift Container Platform release 4.10.31 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (issue 3 of 3)
Ubuntu Security Notice 5566-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5566-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5565-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5565-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5564-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5564-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5560-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5541-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.
Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Security researchers have uncovered yet another vulnerability affecting numerous older AMD and Intel microprocessors that could bypass current defenses and result in Spectre-based speculative-execution attacks. Dubbed Retbleed by ETH Zurich researchers Johannes Wikner and Kaveh Razavi, the issues are tracked as CVE-2022-29900 (AMD) and CVE-2022-29901 (Intel), with the chipmakers releasing
Security researchers have uncovered yet another vulnerability affecting numerous older AMD and Intel microprocessors that could bypass current defenses and result in Spectre-based speculative-execution attacks. Dubbed Retbleed by ETH Zurich researchers Johannes Wikner and Kaveh Razavi, the issues are tracked as CVE-2022-29900 (AMD) and CVE-2022-29901 (Intel), with the chipmakers releasing
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.