Headline
RHSA-2022:1455: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it
- CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
- CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
- kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
- kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes:
- Power10 PMU fix for PM_CYC/PM_INST_CMPL ( kernel/perf) (BZ#2040665)
- call traces and packet drops seen after changing mtu of ibmvnic interface. (ibmvnic/ P10/ Everglade) (BZ#2050679)
- zfcp: fix failed recovery on gone remote port, non-NPIV FCP dev (BZ#2050739)
- overlay mount fails with ELOOP (Too many levels of symbolic links) (BZ#2053030)
- Host unable to automatically add namespaces belonging to a new ANA group (BZ#2055466)
- scheduler updates and fixes [None8.4.0.z] (BZ#2056834)
- nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061445)
- First Packet Latency impacted by mlx5 warning msg (BZ#2067992)
- openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068477)
- Backport upstream rcu commits up to v5.10 (BZ#2069819)
- Packages have been upgraded to a later upstream version: kernel (4.18.0) (BZ#2036932)
Enhancement:
- zcrypt DD: Toleration for new IBM Z Crypto Hardware (BZ#2054097)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
- BZ - 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation
- BZ - 2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
x86_64
bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b
bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08
kernel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2
kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24
kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2
kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4
kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3
kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a
kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860
kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf
kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51
kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553
kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d
kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a
kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586
perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de
perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902
python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
x86_64
bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b
bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08
kernel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2
kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24
kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2
kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4
kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3
kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a
kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860
kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf
kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51
kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553
kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d
kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a
kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586
perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de
perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902
python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
s390x
bpftool-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: f3d7c832af0e151cdab17c5ef82b8bb3321ad77eaa455668a6dfe4889a7d9cf5
bpftool-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 7d86abc25d7d1266357dcf3ac38713ee969a98733d400932dd5bef0ea29d2de1
kernel-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 3689d4999be3d40ed31c1faa40a1b1dc2b148fa8d4ecfee4d786bcc95c6c2b1f
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: d91bc53623fee1b70b916e8758fc60e3fb2e3fb94a6d839b5efd15f16fc68b99
kernel-cross-headers-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 20a104b9d719690aa199baf6512996d3c7255b02762d60ee374aa869076c7f65
kernel-debug-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 500ab4cfb435ff37ab8e585a54f335fc23aad857ec54e9f47897f5d6a3c3e10c
kernel-debug-core-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: bb93c1603fa748f42e562d5f0dcb522e536173825805d2dd7a69f9071a9e7a16
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 8966ca67818e1bfeea436047a3ce0e90642bf9ccb6f268669fa6a2f0496d0e0d
kernel-debug-devel-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 79768526c0ee3017edfeb724ca6840291888ece0968f8c68780256578e47ba61
kernel-debug-modules-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: a832b27fc0065e2d6160aa20063bcc0af7e2c6fa05cdf3b93ed90ead9975fced
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 9a4687dccd7ccb32307f67f736a93f6cb8b05ced8563cb16f63da7dbb3c3c991
kernel-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 06c29f02ae3b6fb10b65950d2a48b7837ee5148079a39c212c96c1b0bd558dbb
kernel-debuginfo-common-s390x-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 262de6a89b0828b7088b62898f75ee9d0426d84d4c27dfbe2c7b0a6289dda705
kernel-devel-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 118bbd6c9977c1beb984384043e9dd907c169da9fcef6ed3778239c59c16a21d
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 99fc80e53314b62e13a54aa7476c154bbf4d6ac0dabe0b528979f2017c8f0614
kernel-modules-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: d5cbe60980e55de9572e6cb637ae890e04b20d2bc60acb0babcddacb9f72a287
kernel-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: a9f94de7d887ddc1efa7acc56e9198fd58edfa462705699884f81603066288dc
kernel-tools-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 5021968d54156f7de45bc5a2307abc04699df480dad19cb266763caeb25d97a7
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: ebcaa933f24c007d7532bb1e268eb3911f3791beb7d44404775de63ca2b44f21
kernel-zfcpdump-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 093b591a1ba33ccd61ae743581f61cc950baa3be5b99cd02271d80d6040b29b0
kernel-zfcpdump-core-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: a9d1e7161e99033d38adbeb16dd6a27257dbdc3988eef62a38a128995c9cf094
kernel-zfcpdump-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 9c5ef806e0e77eb8de0d60add1da45aa7b6476d98cbcc8b6bb4b8440278cfed8
kernel-zfcpdump-devel-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: bd34de9d0d7f3df4ae102d919418dcacc0ced618f05c07066fda74d567d9e4f5
kernel-zfcpdump-modules-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 5aa009a796c5485dd3a358fe3d8b82e105c6807a898c119423b70950a9384ca5
kernel-zfcpdump-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: da2d7c977c5d6fa957760742dc8d862c35ddc5900e96baa7d8f9ff1b281d69a7
perf-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 4e4d220d96c56a6cef541f435e154bd07b63769ba7b3b45f5bcb80f5d94a13c9
perf-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 2659880613282b3b5adb0569984827c75e0e00ebf064f1df717e7c2e0675fd31
python3-perf-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 962ea71884f4a77ff72f1ad8ae738e81fe6d39808eeef72489b240e24feb2958
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm
SHA-256: 6651bf8ad8e7902ad3d901e525dd612cc2579cd5c3e2f453abac87f223f6d8b8
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
ppc64le
bpftool-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 366cffa400853594549293262b8985ffd19872e14eddfdaa61fb9ed1c9cdbaf9
bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1
kernel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 6626246720f43ab586c42127ee01a295cac8fb10aec0cb165322c76a10cdffb8
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 3bf7481f612d9bd7fbdb585f527eaae948e981291173180cf54079a3a8cd30dc
kernel-cross-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 77c01edd9d669b6502070386cae8737f6acd42885dca80b8a3f4a183e686efa8
kernel-debug-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 429eb36381964df4a20f1fbe9ad6c54b6e0d4c81d812c996e0d3def7fefb27d3
kernel-debug-core-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 5b820735a629cb1571ec37bbadddcf3eccc11769356d4cc067eb5f2c6c55ddd0
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b
kernel-debug-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 4a65abba34e3d3c078423be07f2a92dcedf51877b31e65288000525f577d77f0
kernel-debug-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 4f9c265ea2efaf398342e381abf36ee3f507ce574d9771dea38e81156bf1b979
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: d2a8a5ec572db24f9eb82f3413a2974f7d8ee5fe5baf45064631e887a9a59729
kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842
kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370
kernel-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: aac629d7e14e68fb38c6f2003f941827f95aba988bac5ee00e9ddd57923a4a9f
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 0d7d5979f44e151404d2ba89f153d292966637b60cce09dd315da06c57ee3b74
kernel-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 7f29d5d784576bf764df71b259eaca94d6fb0141ce503f6171c1653136d3f359
kernel-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: c90820b4c6211fe34ade6b8c2ccfa943e0a92fa3d0337572e65c0e7e97430cee
kernel-tools-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: a1ba8cbf0f642f5cb2e25fe651cc0f08b6d9a95a19c20548afe7014828d71084
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd
kernel-tools-libs-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 56eca77e48138560bc923b7ff8405118d7623c8aa902159a8e114c4a10b9d4cf
perf-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 82d2e8ad6d5c5ed800cfa6c9d4c9228dcab97d5723dbf3d6f586de57dcff71fa
perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d
python3-perf-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 8456b11ac690fd82398295cf856ad2097008ce3a419f5eb7a2ad9397f0d795b8
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
x86_64
bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b
bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08
kernel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2
kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24
kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2
kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4
kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3
kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a
kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860
kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf
kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51
kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553
kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d
kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a
kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586
perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de
perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902
python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
aarch64
bpftool-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: e042b9af2d9d68b7b4d7f6c2819a08f8adac1c0a1b06bb4090ed7001874c536b
bpftool-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 758ff78e8c626b58fa23b9fa3b33046ac90c1091bed6f751961923883df0bbe1
kernel-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: b670167fbb509a34e0fd1758d1cb8800162e301e046a2f355759f9bb94c571a3
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 323d8f48e99a8f65adc64bb437173155dc06360c9f0dbbf0619e6eaca6f54383
kernel-cross-headers-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: c2db2eb74473ea7b1c05b14d5afb39692e1387e804aeb509dc6a009bb56a02cc
kernel-debug-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 77e905ce2cb6adf72a7d5d5019db1304d9790d6bedb8f4d2a974d2f178c5b8e9
kernel-debug-core-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 2113ac05c7c992908e764e3a9574ace76ca0f2524589f6fbfd7557a55b71be02
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: b59a9e617e1ca601473529a69811c301697e3a1d82d3d79f675b07b0786f1a9e
kernel-debug-devel-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 4886ad30e5302073de2bdfc5fa9a9e477c432917db971bda951010d3627e6765
kernel-debug-modules-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 6fe9fa45e7f6d4115a4e07450f13130266a6e0e89672de182da84e590b743f86
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: a1d0d0726dacc0c321db08c9bea6702b7051b76e2129fd12163c16d23cc7eee4
kernel-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: ddcd8033d5c7ad45981491de390f639034dd394e4300872b002bc75c7288067b
kernel-debuginfo-common-aarch64-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 9c724129cd73e0242f9b443e13edb11e1d8c2e631dda4f722ffc0196aba7c361
kernel-devel-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 23fcf0de1b1d95c40bde9b6177653bda69fba7be737c127da3122963b9a2b73f
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: e95fd72184bb571c95d399e6bbba72544e79c39ad4360436e0ff357c1150e9f2
kernel-modules-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 75df4010b0058ca71083181ea2fe23bb3169e95da2a1fd3cd34e6fd5828d6de7
kernel-modules-extra-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 1eb3f8f1b39d669c8b858e4b6df1818c5ae537ede568028639e0b24fefa76095
kernel-tools-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: fb4689df79287210b0d2a3dd5579ea2be0a9f3edc49b8b508650118b2a7ee315
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 13a9fbf059fa0397ab99e24e2177550c896096250da82c2ed7b9751b8a060ac6
kernel-tools-libs-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 1b19a85b32020fdb35eafb90139042bcd1dfb4c2c3ad8b51b980ee592c1cb695
perf-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 85bea756cf78328f4c7af780cbc37fc90fff50846bc366960eb5812865fed007
perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: aa23174ec0cfbb323d4d9321d2f5258a4cc334b0292852e29a639f8da8130762
python3-perf-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 3a6c1cf049f17a1f1c2f8826fce55e2d4a5928954ef7546ec88894c753b89e4a
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 2a9fec79515cc7becc556383f0d9673e326e753a5627cc205d4b077b4a998ee3
Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
ppc64le
bpftool-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 366cffa400853594549293262b8985ffd19872e14eddfdaa61fb9ed1c9cdbaf9
bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1
kernel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 6626246720f43ab586c42127ee01a295cac8fb10aec0cb165322c76a10cdffb8
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 3bf7481f612d9bd7fbdb585f527eaae948e981291173180cf54079a3a8cd30dc
kernel-cross-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 77c01edd9d669b6502070386cae8737f6acd42885dca80b8a3f4a183e686efa8
kernel-debug-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 429eb36381964df4a20f1fbe9ad6c54b6e0d4c81d812c996e0d3def7fefb27d3
kernel-debug-core-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 5b820735a629cb1571ec37bbadddcf3eccc11769356d4cc067eb5f2c6c55ddd0
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b
kernel-debug-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 4a65abba34e3d3c078423be07f2a92dcedf51877b31e65288000525f577d77f0
kernel-debug-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 4f9c265ea2efaf398342e381abf36ee3f507ce574d9771dea38e81156bf1b979
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: d2a8a5ec572db24f9eb82f3413a2974f7d8ee5fe5baf45064631e887a9a59729
kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842
kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370
kernel-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: aac629d7e14e68fb38c6f2003f941827f95aba988bac5ee00e9ddd57923a4a9f
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 0d7d5979f44e151404d2ba89f153d292966637b60cce09dd315da06c57ee3b74
kernel-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 7f29d5d784576bf764df71b259eaca94d6fb0141ce503f6171c1653136d3f359
kernel-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: c90820b4c6211fe34ade6b8c2ccfa943e0a92fa3d0337572e65c0e7e97430cee
kernel-tools-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: a1ba8cbf0f642f5cb2e25fe651cc0f08b6d9a95a19c20548afe7014828d71084
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd
kernel-tools-libs-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 56eca77e48138560bc923b7ff8405118d7623c8aa902159a8e114c4a10b9d4cf
perf-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 82d2e8ad6d5c5ed800cfa6c9d4c9228dcab97d5723dbf3d6f586de57dcff71fa
perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d
python3-perf-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 8456b11ac690fd82398295cf856ad2097008ce3a419f5eb7a2ad9397f0d795b8
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87
Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.45.1.el8_4.src.rpm
SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e
x86_64
bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b
bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08
kernel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990
kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e
kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2
kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24
kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2
kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4
kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3
kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7
kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a
kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860
kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf
kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2
kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm
SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4
kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51
kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553
kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d
kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a
kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586
perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de
perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902
python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4
kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860
kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a
kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: 231d3545aeb0fbb9a03fe4c678cc619cf877a02b0049ad55bfb967850874a056
perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm
SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b
kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842
kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd
kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: b3d9cf6432d426b0c5bbcff3c79c586069974d5814adc535457528426e6533ae
perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm
SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 758ff78e8c626b58fa23b9fa3b33046ac90c1091bed6f751961923883df0bbe1
kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: b59a9e617e1ca601473529a69811c301697e3a1d82d3d79f675b07b0786f1a9e
kernel-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: ddcd8033d5c7ad45981491de390f639034dd394e4300872b002bc75c7288067b
kernel-debuginfo-common-aarch64-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 9c724129cd73e0242f9b443e13edb11e1d8c2e631dda4f722ffc0196aba7c361
kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 13a9fbf059fa0397ab99e24e2177550c896096250da82c2ed7b9751b8a060ac6
kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 440c5f1a276610eaf595bc777036cd8e2ac31f4f3d4b264d255f9ac507bb9754
perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: aa23174ec0cfbb323d4d9321d2f5258a4cc334b0292852e29a639f8da8130762
python3-perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm
SHA-256: 2a9fec79515cc7becc556383f0d9673e326e753a5627cc205d4b077b4a998ee3
Related news
Logging Subsystem 5.4 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter
acs commons is an open source framework for AEM projects. ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. This issue has been resolved in 5.2.0. There are no known workarounds for this issue.
Updated Satellite 6.9 packages that fix several bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-27023: puppet: unsafe HTTP redirect
HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.
Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml...
Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml2: Use-after-free in xmlXIncludeDoProcess() in xinc...
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the [email protected]. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.
SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.
wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-03-30-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0), so that their applications are no longer affected. There are no known workarounds for this issue. ### Patches * The issue has been fixed in wire-webapp **2022-03-30-production.0** an...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
Oracle's April Critical Patch UPdate contains 520 new security patches. We spell out some of the most important vulnerabilities. The post Oracle releases massive Critical Patch Update containing 520 security patches appeared first on Malwarebytes Labs.
A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
Red Hat OpenShift Container Platform release 4.9.29 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) *...
Red Hat OpenShift Container Platform release 4.7.49 is now available with updates to packages and images that fix several bugs and add enhancements. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.49. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0711: haproxy: Denial of service via set-cookie2 header
Red Hat OpenShift Container Platform release 4.8.37 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.37. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.10.10 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Cross-site request forgery (CSRF) vulnerability in 'MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership' versions prior to 1.9.6 allows a remote unauthenticated attacker to hijack the authentication of an administrator and perform unintended operation via unspecified vectors.
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended progra...
Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.
next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
The CleanTalk AntiSpam plugin <= 5.173 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter in`/lib/Cleantalk/ApbctWP/FindSpam/ListTable/Users.php`
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
The WordPress WP YouTube Live Plugin is vulnerable to Reflected Cross-Site Scripting via POST data found in the ~/inc/admin.php file which allows unauthenticated attackers to inject arbitrary web scripts in versions up to, and including, 1.7.21.
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
Smokescreen is a simple HTTP proxy that fogs over naughty URLs. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. Recommended to upgrade Smokescreen to version 0.0.3 or later.
Exploring what's next for public-cloud security, including top risks and how to implement better risk management.
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.