Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:1455: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-4083: kernel: fget: check that the fd still exists after getting a ref to it
  • CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation
  • CVE-2022-25636: kernel: heap out of bounds write in nf_dup_netdev.c
Red Hat Security Data
#vulnerability#linux#red_hat

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
  • kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
  • kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes:

  • Power10 PMU fix for PM_CYC/PM_INST_CMPL ( kernel/perf) (BZ#2040665)
  • call traces and packet drops seen after changing mtu of ibmvnic interface. (ibmvnic/ P10/ Everglade) (BZ#2050679)
  • zfcp: fix failed recovery on gone remote port, non-NPIV FCP dev (BZ#2050739)
  • overlay mount fails with ELOOP (Too many levels of symbolic links) (BZ#2053030)
  • Host unable to automatically add namespaces belonging to a new ANA group (BZ#2055466)
  • scheduler updates and fixes [None8.4.0.z] (BZ#2056834)
  • nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061445)
  • First Packet Latency impacted by mlx5 warning msg (BZ#2067992)
  • openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068477)
  • Backport upstream rcu commits up to v5.10 (BZ#2069819)
  • Packages have been upgraded to a later upstream version: kernel (4.18.0) (BZ#2036932)

Enhancement:

  • zcrypt DD: Toleration for new IBM Z Crypto Hardware (BZ#2054097)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
  • BZ - 2051505 - CVE-2022-0492 kernel: cgroups v1 release_agent feature may allow privilege escalation
  • BZ - 2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

x86_64

bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b

bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08

kernel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2

kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24

kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2

kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4

kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3

kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a

kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860

kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf

kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51

kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553

kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d

kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a

kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586

perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de

perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902

python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

x86_64

bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b

bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08

kernel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2

kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24

kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2

kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4

kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3

kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a

kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860

kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf

kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51

kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553

kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d

kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a

kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586

perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de

perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902

python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

s390x

bpftool-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: f3d7c832af0e151cdab17c5ef82b8bb3321ad77eaa455668a6dfe4889a7d9cf5

bpftool-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 7d86abc25d7d1266357dcf3ac38713ee969a98733d400932dd5bef0ea29d2de1

kernel-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 3689d4999be3d40ed31c1faa40a1b1dc2b148fa8d4ecfee4d786bcc95c6c2b1f

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: d91bc53623fee1b70b916e8758fc60e3fb2e3fb94a6d839b5efd15f16fc68b99

kernel-cross-headers-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 20a104b9d719690aa199baf6512996d3c7255b02762d60ee374aa869076c7f65

kernel-debug-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 500ab4cfb435ff37ab8e585a54f335fc23aad857ec54e9f47897f5d6a3c3e10c

kernel-debug-core-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: bb93c1603fa748f42e562d5f0dcb522e536173825805d2dd7a69f9071a9e7a16

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 8966ca67818e1bfeea436047a3ce0e90642bf9ccb6f268669fa6a2f0496d0e0d

kernel-debug-devel-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 79768526c0ee3017edfeb724ca6840291888ece0968f8c68780256578e47ba61

kernel-debug-modules-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: a832b27fc0065e2d6160aa20063bcc0af7e2c6fa05cdf3b93ed90ead9975fced

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 9a4687dccd7ccb32307f67f736a93f6cb8b05ced8563cb16f63da7dbb3c3c991

kernel-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 06c29f02ae3b6fb10b65950d2a48b7837ee5148079a39c212c96c1b0bd558dbb

kernel-debuginfo-common-s390x-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 262de6a89b0828b7088b62898f75ee9d0426d84d4c27dfbe2c7b0a6289dda705

kernel-devel-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 118bbd6c9977c1beb984384043e9dd907c169da9fcef6ed3778239c59c16a21d

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 99fc80e53314b62e13a54aa7476c154bbf4d6ac0dabe0b528979f2017c8f0614

kernel-modules-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: d5cbe60980e55de9572e6cb637ae890e04b20d2bc60acb0babcddacb9f72a287

kernel-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: a9f94de7d887ddc1efa7acc56e9198fd58edfa462705699884f81603066288dc

kernel-tools-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 5021968d54156f7de45bc5a2307abc04699df480dad19cb266763caeb25d97a7

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: ebcaa933f24c007d7532bb1e268eb3911f3791beb7d44404775de63ca2b44f21

kernel-zfcpdump-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 093b591a1ba33ccd61ae743581f61cc950baa3be5b99cd02271d80d6040b29b0

kernel-zfcpdump-core-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: a9d1e7161e99033d38adbeb16dd6a27257dbdc3988eef62a38a128995c9cf094

kernel-zfcpdump-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 9c5ef806e0e77eb8de0d60add1da45aa7b6476d98cbcc8b6bb4b8440278cfed8

kernel-zfcpdump-devel-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: bd34de9d0d7f3df4ae102d919418dcacc0ced618f05c07066fda74d567d9e4f5

kernel-zfcpdump-modules-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 5aa009a796c5485dd3a358fe3d8b82e105c6807a898c119423b70950a9384ca5

kernel-zfcpdump-modules-extra-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: da2d7c977c5d6fa957760742dc8d862c35ddc5900e96baa7d8f9ff1b281d69a7

perf-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 4e4d220d96c56a6cef541f435e154bd07b63769ba7b3b45f5bcb80f5d94a13c9

perf-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 2659880613282b3b5adb0569984827c75e0e00ebf064f1df717e7c2e0675fd31

python3-perf-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 962ea71884f4a77ff72f1ad8ae738e81fe6d39808eeef72489b240e24feb2958

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.s390x.rpm

SHA-256: 6651bf8ad8e7902ad3d901e525dd612cc2579cd5c3e2f453abac87f223f6d8b8

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

ppc64le

bpftool-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 366cffa400853594549293262b8985ffd19872e14eddfdaa61fb9ed1c9cdbaf9

bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1

kernel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 6626246720f43ab586c42127ee01a295cac8fb10aec0cb165322c76a10cdffb8

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 3bf7481f612d9bd7fbdb585f527eaae948e981291173180cf54079a3a8cd30dc

kernel-cross-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 77c01edd9d669b6502070386cae8737f6acd42885dca80b8a3f4a183e686efa8

kernel-debug-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 429eb36381964df4a20f1fbe9ad6c54b6e0d4c81d812c996e0d3def7fefb27d3

kernel-debug-core-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 5b820735a629cb1571ec37bbadddcf3eccc11769356d4cc067eb5f2c6c55ddd0

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b

kernel-debug-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 4a65abba34e3d3c078423be07f2a92dcedf51877b31e65288000525f577d77f0

kernel-debug-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 4f9c265ea2efaf398342e381abf36ee3f507ce574d9771dea38e81156bf1b979

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: d2a8a5ec572db24f9eb82f3413a2974f7d8ee5fe5baf45064631e887a9a59729

kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842

kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370

kernel-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: aac629d7e14e68fb38c6f2003f941827f95aba988bac5ee00e9ddd57923a4a9f

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 0d7d5979f44e151404d2ba89f153d292966637b60cce09dd315da06c57ee3b74

kernel-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 7f29d5d784576bf764df71b259eaca94d6fb0141ce503f6171c1653136d3f359

kernel-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: c90820b4c6211fe34ade6b8c2ccfa943e0a92fa3d0337572e65c0e7e97430cee

kernel-tools-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: a1ba8cbf0f642f5cb2e25fe651cc0f08b6d9a95a19c20548afe7014828d71084

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd

kernel-tools-libs-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 56eca77e48138560bc923b7ff8405118d7623c8aa902159a8e114c4a10b9d4cf

perf-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 82d2e8ad6d5c5ed800cfa6c9d4c9228dcab97d5723dbf3d6f586de57dcff71fa

perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d

python3-perf-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 8456b11ac690fd82398295cf856ad2097008ce3a419f5eb7a2ad9397f0d795b8

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

x86_64

bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b

bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08

kernel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2

kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24

kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2

kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4

kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3

kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a

kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860

kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf

kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51

kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553

kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d

kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a

kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586

perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de

perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902

python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

aarch64

bpftool-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: e042b9af2d9d68b7b4d7f6c2819a08f8adac1c0a1b06bb4090ed7001874c536b

bpftool-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 758ff78e8c626b58fa23b9fa3b33046ac90c1091bed6f751961923883df0bbe1

kernel-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: b670167fbb509a34e0fd1758d1cb8800162e301e046a2f355759f9bb94c571a3

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 323d8f48e99a8f65adc64bb437173155dc06360c9f0dbbf0619e6eaca6f54383

kernel-cross-headers-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: c2db2eb74473ea7b1c05b14d5afb39692e1387e804aeb509dc6a009bb56a02cc

kernel-debug-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 77e905ce2cb6adf72a7d5d5019db1304d9790d6bedb8f4d2a974d2f178c5b8e9

kernel-debug-core-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 2113ac05c7c992908e764e3a9574ace76ca0f2524589f6fbfd7557a55b71be02

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: b59a9e617e1ca601473529a69811c301697e3a1d82d3d79f675b07b0786f1a9e

kernel-debug-devel-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 4886ad30e5302073de2bdfc5fa9a9e477c432917db971bda951010d3627e6765

kernel-debug-modules-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 6fe9fa45e7f6d4115a4e07450f13130266a6e0e89672de182da84e590b743f86

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: a1d0d0726dacc0c321db08c9bea6702b7051b76e2129fd12163c16d23cc7eee4

kernel-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: ddcd8033d5c7ad45981491de390f639034dd394e4300872b002bc75c7288067b

kernel-debuginfo-common-aarch64-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 9c724129cd73e0242f9b443e13edb11e1d8c2e631dda4f722ffc0196aba7c361

kernel-devel-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 23fcf0de1b1d95c40bde9b6177653bda69fba7be737c127da3122963b9a2b73f

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: e95fd72184bb571c95d399e6bbba72544e79c39ad4360436e0ff357c1150e9f2

kernel-modules-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 75df4010b0058ca71083181ea2fe23bb3169e95da2a1fd3cd34e6fd5828d6de7

kernel-modules-extra-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 1eb3f8f1b39d669c8b858e4b6df1818c5ae537ede568028639e0b24fefa76095

kernel-tools-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: fb4689df79287210b0d2a3dd5579ea2be0a9f3edc49b8b508650118b2a7ee315

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 13a9fbf059fa0397ab99e24e2177550c896096250da82c2ed7b9751b8a060ac6

kernel-tools-libs-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 1b19a85b32020fdb35eafb90139042bcd1dfb4c2c3ad8b51b980ee592c1cb695

perf-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 85bea756cf78328f4c7af780cbc37fc90fff50846bc366960eb5812865fed007

perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: aa23174ec0cfbb323d4d9321d2f5258a4cc334b0292852e29a639f8da8130762

python3-perf-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 3a6c1cf049f17a1f1c2f8826fce55e2d4a5928954ef7546ec88894c753b89e4a

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 2a9fec79515cc7becc556383f0d9673e326e753a5627cc205d4b077b4a998ee3

Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

ppc64le

bpftool-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 366cffa400853594549293262b8985ffd19872e14eddfdaa61fb9ed1c9cdbaf9

bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1

kernel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 6626246720f43ab586c42127ee01a295cac8fb10aec0cb165322c76a10cdffb8

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 3bf7481f612d9bd7fbdb585f527eaae948e981291173180cf54079a3a8cd30dc

kernel-cross-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 77c01edd9d669b6502070386cae8737f6acd42885dca80b8a3f4a183e686efa8

kernel-debug-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 429eb36381964df4a20f1fbe9ad6c54b6e0d4c81d812c996e0d3def7fefb27d3

kernel-debug-core-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 5b820735a629cb1571ec37bbadddcf3eccc11769356d4cc067eb5f2c6c55ddd0

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b

kernel-debug-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 4a65abba34e3d3c078423be07f2a92dcedf51877b31e65288000525f577d77f0

kernel-debug-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 4f9c265ea2efaf398342e381abf36ee3f507ce574d9771dea38e81156bf1b979

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: d2a8a5ec572db24f9eb82f3413a2974f7d8ee5fe5baf45064631e887a9a59729

kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842

kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370

kernel-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: aac629d7e14e68fb38c6f2003f941827f95aba988bac5ee00e9ddd57923a4a9f

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 0d7d5979f44e151404d2ba89f153d292966637b60cce09dd315da06c57ee3b74

kernel-modules-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 7f29d5d784576bf764df71b259eaca94d6fb0141ce503f6171c1653136d3f359

kernel-modules-extra-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: c90820b4c6211fe34ade6b8c2ccfa943e0a92fa3d0337572e65c0e7e97430cee

kernel-tools-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: a1ba8cbf0f642f5cb2e25fe651cc0f08b6d9a95a19c20548afe7014828d71084

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd

kernel-tools-libs-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 56eca77e48138560bc923b7ff8405118d7623c8aa902159a8e114c4a10b9d4cf

perf-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 82d2e8ad6d5c5ed800cfa6c9d4c9228dcab97d5723dbf3d6f586de57dcff71fa

perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d

python3-perf-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 8456b11ac690fd82398295cf856ad2097008ce3a419f5eb7a2ad9397f0d795b8

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87

Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.45.1.el8_4.src.rpm

SHA-256: f2f27658b17ff46221739be6e9111561cf1a9534208dc0ae4008321ede3f8d5e

x86_64

bpftool-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 54f10f09711c926fd70bea74b2ebaad8a8c1b9e73e1782583ffc71a8a9a0775b

bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08

kernel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: a5e3630ff3c86166e689d18692f1dd725608a12e7184889c632918e2b560c990

kernel-abi-stablelists-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a906eb8151fca1f4860f908ec1a303b518f8dab03e6822d05cbbcfd148a3f82e

kernel-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 28e1c410572abde52116eb8d863758896873f6313b09e5c2f8b7e5a50bb47cf2

kernel-cross-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9d90ea7ffe35ce6d93432d40e0767e13aa387a3bcc3cad7a73613af05567cc24

kernel-debug-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 22d534c54c3101faa7b59f51ac892304e46dec403287e020edce2f537f2a70e2

kernel-debug-core-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7d0cf37676bf9f74207c11f0c8746cd3af415f50138bdeb90394e0ce7c80ab38

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4

kernel-debug-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8c40dae783462f92a69a39ac8e8ed68d858acc4f7f939f730045758af7fa07c3

kernel-debug-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1089ece9ee9af4763020231f660dc28c69bb963579fe0a47fe14ac83bbf8a7c7

kernel-debug-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 434f4b11dcd1af49234222aeafdea7fd73f64b8fa0207e70a411320d88e5911a

kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860

kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf

kernel-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0a3f5b620b1ffbd4c1d2790d51ce367ee46e7e7c11857a3bc54285de67f728d2

kernel-doc-4.18.0-305.45.1.el8_4.noarch.rpm

SHA-256: a931e64bda84f98c6d44da148ee1f4f95cdaf1d092b53bc90057dfa9462e60a4

kernel-headers-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 0379e6129145624b2aeba80bd35478189855caae805344e1480807780367bd51

kernel-modules-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 7ca4831d7d33717cfbef984a08f75fb91fd5cdda07482c2919270fd27e4f8553

kernel-modules-extra-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ac94fbb153bc2bf5afc2fc5d60dcd39d1b2ee0a21aefeca3b461d9f08b291b1d

kernel-tools-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 788142d5bc85d27cd6f309c1f88e10f61cf90d006155fe30723bfb8b45976390

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a

kernel-tools-libs-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 9ed9990db4cbc9276724323875de5c7e2cbb739e43b24e3575339fdeb21a0586

perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 3e7a2e72aec65889d50c88cc650461de97be9d9c2221ff037d49155085d6e4de

perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902

python3-perf-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: ee99ec371f545c0962071f6e764e50a3b325ef2614660fadb8a4b9601ed9854d

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 5d0e73e8a8d981f5c0b76a0e3340457ceed894b330c8bc37e9d8743d3a61aa08

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1b8f2f533fa69a3e2efa48e43fbcacaa40e2342ecdaf9977c2a07b3046a9a6f4

kernel-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 1d5c76d73d1038a390c3c1dbd5305d073a9e8c775f64f43f4a6b1258f7c11860

kernel-debuginfo-common-x86_64-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 8ce6140d130dd0be3a4c93fc3ee6814dcce50df163dd9d4cf071b0ab45775faf

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: d1e129b80040c705e9c643460dff156b78701f5dbc2de7fbd90028aa86e6d55a

kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: 231d3545aeb0fbb9a03fe4c678cc619cf877a02b0049ad55bfb967850874a056

perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: e1954043d48b42a5292160c06b422ea505417448e4c2b909fd3315aec049f902

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.x86_64.rpm

SHA-256: f9c80b96ed61f0d00df02da0bc1b960ec53aed42d8f858c0c50810014d1ce4e8

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: c6efca0b2164b4e1404577a676fed2318d60a9c98300c37968a4bde7dd197fe1

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 77e3868c99d2aa9e89a19886cf3c2a78c1311135a4be97dba82b6f06113d605b

kernel-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: ebd13d8fba2363e2ab32eb370a33b98993bbf59b982ee2309b5cdd13dbdef842

kernel-debuginfo-common-ppc64le-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 52408c29991a68c77c1fa221cd34e3c2791af1bc6a535cf258c16776f67f6370

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 1268287751f4ebe7d236d8028a43194c57c74bd49e7153c54e2c16419be392bd

kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: b3d9cf6432d426b0c5bbcff3c79c586069974d5814adc535457528426e6533ae

perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: a6fd47c92c76fce1b2c1eb8a78bffcd260c2e0ae6eb6bb60d8b064afda5bdd1d

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.ppc64le.rpm

SHA-256: 72e83078768aab502540496d39ab1fad5bfd9468a2f178b86ae06697a890cb87

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 758ff78e8c626b58fa23b9fa3b33046ac90c1091bed6f751961923883df0bbe1

kernel-debug-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: b59a9e617e1ca601473529a69811c301697e3a1d82d3d79f675b07b0786f1a9e

kernel-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: ddcd8033d5c7ad45981491de390f639034dd394e4300872b002bc75c7288067b

kernel-debuginfo-common-aarch64-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 9c724129cd73e0242f9b443e13edb11e1d8c2e631dda4f722ffc0196aba7c361

kernel-tools-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 13a9fbf059fa0397ab99e24e2177550c896096250da82c2ed7b9751b8a060ac6

kernel-tools-libs-devel-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 440c5f1a276610eaf595bc777036cd8e2ac31f4f3d4b264d255f9ac507bb9754

perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: aa23174ec0cfbb323d4d9321d2f5258a4cc334b0292852e29a639f8da8130762

python3-perf-debuginfo-4.18.0-305.45.1.el8_4.aarch64.rpm

SHA-256: 2a9fec79515cc7becc556383f0d9673e326e753a5627cc205d4b077b4a998ee3

Related news

RHSA-2022:1461: Red Hat Security Advisory: Logging Subsystem 5.4 - Red Hat OpenShift Security and Bug update

Logging Subsystem 5.4 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter

CVE-2022-24874: Build software better, together

acs commons is an open source framework for AEM projects. ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. This issue has been resolved in 5.2.0. There are no known workarounds for this issue.

RHSA-2022:1478: Red Hat Security Advisory: Satellite 6.9.9 Async Bug Fix Update

Updated Satellite 6.9 packages that fix several bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-27023: puppet: unsafe HTTP redirect

CVE-2022-24865: Fix must change password (#5638) · humhub/humhub@eb83de2

HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.

RHSA-2022:1389: Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update

Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml...

RHSA-2022:1390: Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security update

Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 11 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3516: libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3517: libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c * CVE-2021-3518: libxml2: Use-after-free in xmlXIncludeDoProcess() in xinc...

CVE-2022-24862: Build software better, together

Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.

CVE-2022-24871: Shopware 6 - Security Updates

Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.

CVE-2022-0540: Jira Security Advisory 2022-04-20 | Atlassian Support

A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.

CVE-2022-24864: Remove presale join endpoint by DanielVF · Pull Request #617 · OriginProtocol/origin-website

Origin Protocol is a blockchain based project. The Origin Protocol project website allows for malicious users to inject malicious Javascript via a POST request to `/presale/join`. User-controlled data is passed with no sanitization to SendGrid and injected into an email that is delivered to the [email protected]. If the email recipient is using an email program that is susceptible to XSS, then that email recipient will receive an email that may contain malicious XSS. Regardless if the email recipient’s mail program has vulnerabilities or not, the hacker can at the very least inject malicious HTML that modifies the body content of the email. There are currently no known workarounds.

CVE-2022-26133: [BSERV-13173] Bitbucket Data Center - Java Deserialization Vulnerability In Hazelcast - CVE-2022-26133

SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.

CVE-2022-24861: fix some security bug (#103) · vran-dev/databasir@ca22a8f

Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.

CVE-2022-24799: fix: Improve message rendering (#12748) · wireapp/wire-webapp@d144552

wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-03-30-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-03-30-production.0-v0.29.2-0-d144552 or wire-server 2022-03-30 (chart/4.8.0), so that their applications are no longer affected. There are no known workarounds for this issue. ### Patches * The issue has been fixed in wire-webapp **2022-03-30-production.0** an...

RHSA-2022:1440: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...

RHSA-2022:1463: Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8

New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern

RHSA-2022:1462: Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7

New Red Hat Single Sign-On 7.5.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern

Oracle releases massive Critical Patch Update containing 520 security patches

Oracle's April Critical Patch UPdate contains 520 new security patches. We spell out some of the most important vulnerabilities. The post Oracle releases massive Critical Patch Update containing 520 security patches appeared first on Malwarebytes Labs.

RHSA-2022:1469: Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update

A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-45105: log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern

RHSA-2022:1363: Red Hat Security Advisory: OpenShift Container Platform 4.9.29 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.29 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty

RHSA-2022:1442: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...

RHSA-2022:1445: Red Hat Security Advisory: java-17-openjdk security and bug fix update

An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...

RHSA-2022:1441: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...

RHSA-2022:1443: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-...

RHSA-2022:1444: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) *...

RHSA-2022:1336: Red Hat Security Advisory: OpenShift Container Platform 4.7.49 security update

Red Hat OpenShift Container Platform release 4.7.49 is now available with updates to packages and images that fix several bugs and add enhancements. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.49. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0711: haproxy: Denial of service via set-cookie2 header

RHSA-2022:1370: Red Hat Security Advisory: OpenShift Container Platform 4.8.37 security and extras update

Red Hat OpenShift Container Platform release 4.8.37 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.37. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty

RHSA-2022:1357: Red Hat Security Advisory: OpenShift Container Platform 4.10.10 security and extras update

Red Hat OpenShift Container Platform release 4.10.10 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty

CVE-2022-27629: MicroPayments – Paid Author Subscriptions, Content, Downloads, Membership

Cross-site request forgery (CSRF) vulnerability in 'MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership' versions prior to 1.9.6 allows a remote unauthenticated attacker to hijack the authentication of an administrator and perform unintended operation via unspecified vectors.

CVE-2022-24826: Build software better, together

On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended progra...

CVE-2021-3101: Build software better, together

Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.

CVE-2022-24858: Upgrade Guide (v4) | NextAuth.js

next-auth v3 users before version 3.29.2 are impacted. next-auth version 4 users before version 4.3.2 are also impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your callbacks option. If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.

CVE-2022-21496: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...

CVE-2022-28222: Reflected XSS in Spam protection, AntiSpam, FireWall by CleanTalk

The CleanTalk AntiSpam plugin <= 5.173 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter in`/lib/Cleantalk/ApbctWP/FindSpam/ListTable/Users.php`

CVE-2022-21498: Oracle Critical Patch Update Advisory - April 2022

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).

CVE-2022-1187: Changeset 2702715 for wp-youtube-live – WordPress Plugin Repository

The WordPress WP YouTube Live Plugin is vulnerable to Reflected Cross-Site Scripting via POST data found in the ~/inc/admin.php file which allows unauthenticated attackers to inject arbitrary web scripts in versions up to, and including, 1.7.21.

CVE-2022-1186: Changeset 2701343 for be-popia-compliant – WordPress Plugin Repository

The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.

CVE-2022-1329: Changeset 2708766 for elementor/trunk/core/app/modules/onboarding/module.php – WordPress Plugin Repository

The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.

CVE-2022-24825: Build software better, together

Smokescreen is a simple HTTP proxy that fogs over naughty URLs. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. Recommended to upgrade Smokescreen to version 0.0.3 or later.

Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Exploring what's next for public-cloud security, including top risks and how to implement better risk management.

CVE-2022-25648: Command Injection in git | CVE-2022-25648 | Snyk

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.