Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5564: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • conntrack entries linger around after test (BZ#2066356)
  • Any process performing I/O doesn’t fail on degraded LVM RAID and IO process hangs (BZ#2075075)
  • fix data corruption caused by dm-integrity (BZ#2082184)
  • Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083308)
  • SUT will flash once color screen during boot to OS. (BZ#2083384)
  • Kernel Support Fixes for UV5 platform (BZ#2084645)
  • i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2091078)
  • glock deadlock (using the dct tool) (BZ#2092073)
  • Recursive locking in gfs2_fault (read/write + mmap) (BZ#2092074)
  • 8.6.z backport of “vmxnet3: add support for 32 Tx/Rx queues” from BZ 2083561 (BZ#2094473)
  • System freezes with callstack in dmesg: ret_from_fork (BZ#2096305)
  • Need some changes in RHEL8.x kernels. (BZ#2096931)
  • Bad length in dpctl/dump-flows (BZ#2097796)

Enhancement(s):

  • Elkhart Graphics - remove force_probe flag (BZ#2075567)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation

Red Hat Enterprise Linux for x86_64 8

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

x86_64

bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1cd91e8ca4704eb34bccd83517368f489d2baeb6a130f5d535d0d8fa0bd6be8d

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d3fffcd41b359742dd7cb8059a7247dc2aa4c1d4098fcbe96e3ce4eed5d5b6d3

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 8f21e45ad60806d7c1d01ac3ff2ad652f4b2461afd40e2fec02cdf2aedb33dfc

kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7cc7d8af3b795bb28d71c1649279a574ab3719e6f799e4cc5091a7e49f77e0e6

kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 49da7baa3700c015b74a430a7943f0b2c11a80a0da99749963949b61753a4740

kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d034e3defe681b7889f501eb5e8ac7880e4553c61e2a2e3494494f7d0aa7d2b5

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: e438b60610f578f5a8049b6cfec407d0346be3ad562dcaf2295a7c8959125d17

kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 75e9d959867234a9b14d802da76fc391921f6d781b44299c4445e47afdddd49c

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: eda0fa5e7ef900e7bb10ec5d1d58dbf8e2e6d5817c8f27f58f4fe545197cf4cf

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: fd6c9c3ee80537be313229bdd3c42a7412679c3021ef55be5de79c032076e75e

kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 84c8213a1a19dfd642627835ef51ebcd957ca32f2dd436a056f4a8ff38db5f39

kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: c0424f3ad57bd18c9ef96b228f24f540bc4b36a4ad62eab0a15d106e6962f9df

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d69c996f311ef7532b27ccfd02cfdf4560a7621355e3c3ebd4e4dba2b0f5f55d

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d25b84ef02525f427aba874796473d2da1c3c6a63d38bcc24c9a4b61acff6ef1

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

x86_64

bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1cd91e8ca4704eb34bccd83517368f489d2baeb6a130f5d535d0d8fa0bd6be8d

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d3fffcd41b359742dd7cb8059a7247dc2aa4c1d4098fcbe96e3ce4eed5d5b6d3

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 8f21e45ad60806d7c1d01ac3ff2ad652f4b2461afd40e2fec02cdf2aedb33dfc

kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7cc7d8af3b795bb28d71c1649279a574ab3719e6f799e4cc5091a7e49f77e0e6

kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 49da7baa3700c015b74a430a7943f0b2c11a80a0da99749963949b61753a4740

kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d034e3defe681b7889f501eb5e8ac7880e4553c61e2a2e3494494f7d0aa7d2b5

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: e438b60610f578f5a8049b6cfec407d0346be3ad562dcaf2295a7c8959125d17

kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 75e9d959867234a9b14d802da76fc391921f6d781b44299c4445e47afdddd49c

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: eda0fa5e7ef900e7bb10ec5d1d58dbf8e2e6d5817c8f27f58f4fe545197cf4cf

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: fd6c9c3ee80537be313229bdd3c42a7412679c3021ef55be5de79c032076e75e

kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 84c8213a1a19dfd642627835ef51ebcd957ca32f2dd436a056f4a8ff38db5f39

kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: c0424f3ad57bd18c9ef96b228f24f540bc4b36a4ad62eab0a15d106e6962f9df

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d69c996f311ef7532b27ccfd02cfdf4560a7621355e3c3ebd4e4dba2b0f5f55d

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d25b84ef02525f427aba874796473d2da1c3c6a63d38bcc24c9a4b61acff6ef1

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

x86_64

bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1cd91e8ca4704eb34bccd83517368f489d2baeb6a130f5d535d0d8fa0bd6be8d

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d3fffcd41b359742dd7cb8059a7247dc2aa4c1d4098fcbe96e3ce4eed5d5b6d3

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 8f21e45ad60806d7c1d01ac3ff2ad652f4b2461afd40e2fec02cdf2aedb33dfc

kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7cc7d8af3b795bb28d71c1649279a574ab3719e6f799e4cc5091a7e49f77e0e6

kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 49da7baa3700c015b74a430a7943f0b2c11a80a0da99749963949b61753a4740

kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d034e3defe681b7889f501eb5e8ac7880e4553c61e2a2e3494494f7d0aa7d2b5

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: e438b60610f578f5a8049b6cfec407d0346be3ad562dcaf2295a7c8959125d17

kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 75e9d959867234a9b14d802da76fc391921f6d781b44299c4445e47afdddd49c

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: eda0fa5e7ef900e7bb10ec5d1d58dbf8e2e6d5817c8f27f58f4fe545197cf4cf

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: fd6c9c3ee80537be313229bdd3c42a7412679c3021ef55be5de79c032076e75e

kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 84c8213a1a19dfd642627835ef51ebcd957ca32f2dd436a056f4a8ff38db5f39

kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: c0424f3ad57bd18c9ef96b228f24f540bc4b36a4ad62eab0a15d106e6962f9df

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d69c996f311ef7532b27ccfd02cfdf4560a7621355e3c3ebd4e4dba2b0f5f55d

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d25b84ef02525f427aba874796473d2da1c3c6a63d38bcc24c9a4b61acff6ef1

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

s390x

bpftool-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 15acf839b12f3d900032cc9c554fe1fb573deaa60120caaf3918e830372c2d5c

bpftool-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2d67a23c4bfe98169fa8f05d5a13e566d78cae30b2a4701b149ce14ab101cbb3

kernel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: c6f9a7c477b1428d69248b7ae295b90579c7389182915859f86ef30c9012c8e2

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: a663fbea2df38ca84704ebf70ca2c78bb95884ec4c8cec186673da450b78947e

kernel-cross-headers-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e124526c19adfb4871624f19332b2590765d36727f5ef2a26e8da1001d5c7e94

kernel-debug-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2504e59da8a9f51c6d95a092ea18f4c3ad5f47961cd9e568d4dce8505943d58d

kernel-debug-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 74a2cd53ca3f0ba4c47093c9c29bb588d19f030b0dd1a72ac56b0b42d5fb8216

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 5283e7ff1b134e9df80c8f46e02f7388c98e49b46f7f1007fef3cfe92bf1a128

kernel-debug-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: cfcb121c1bdbcc872deeedb661bf8e0fbc73082f9dd04441900e267741a26e9f

kernel-debug-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 7dce4ad1b3d52f470280b4903c5c7186c2204b1a29197053f7428288bd88abd1

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 1f728aa5c29f88da2b486e234020d5f8db854978c06a1c7b3be1dbf2c8b8a1f8

kernel-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e24268f2fe645ce5a01a5b51249cef3ca06b22992890bca7f697e605bf4a5b60

kernel-debuginfo-common-s390x-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: f08127fb9d83791b601c46b231ab3867990a092f4647a6f49e6d62939cc07d28

kernel-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 96b063f2a47df985a86a28c6982aac4c739b57de764ff2bff6521b2bf781ce40

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: b8565bab3279f4ab6524142132be0ad8bc1c9bc1a3d1109e9637f8d4c7bffdb6

kernel-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: df26939a7565075433ca3122b0dd9c54a0e770a638e3e41d27016fa6361b252d

kernel-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 37805bb1fcd5a5180fbc1af18f04c63b4942144905567f65835af5148b4fd88a

kernel-tools-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 85bbf9d5ebda028ad51730dcc46411ca4e021be0af74d0401c6f30d3fc39a744

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: a1abe5460e7e4791ab1e12130c0c1be5057245544f1af27569da42bd8da57545

kernel-zfcpdump-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 41778a2d192cc04553ef8006bb18070d70647a71a9539b43e8f4b15967ae75ab

kernel-zfcpdump-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 920a5cd5db82029edcb98eb55857220e01c4146c477e22a1a7aef2f5a156a14a

kernel-zfcpdump-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e1f3fbad41b79c5b216482935a7c4e640ff686fe6de6d586cd6c0bb1ccfcc221

kernel-zfcpdump-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 00f930bf709e786691a7c41f181fa4e705845412ec2699218062ee96ad58d1fa

kernel-zfcpdump-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: d368189071c9c01042951ada1e98845d5a45bdb0c6c36c3d67c79735f1761233

kernel-zfcpdump-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 99997b174fa98a2802359b2261f170788bcc8b66ef3084f1ca617f0b7cca7222

perf-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: c1c9bdbfe234938fac1f569a1547a03172575c51e4dfbc8c839d3f5b929f6cd1

perf-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 65df2506b432b37092db19dac7831b326b1c9915121c8e3b1574902d63ba5a77

python3-perf-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2000d3ce9184a58e1cd52fe3108cbdd3b07a91bf440ae1e216773ef9c815dfaa

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 89c826cb2005a6cb59357033328d83abc1e6668913d5d80919ad834954a45a56

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

s390x

bpftool-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 15acf839b12f3d900032cc9c554fe1fb573deaa60120caaf3918e830372c2d5c

bpftool-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2d67a23c4bfe98169fa8f05d5a13e566d78cae30b2a4701b149ce14ab101cbb3

kernel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: c6f9a7c477b1428d69248b7ae295b90579c7389182915859f86ef30c9012c8e2

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: a663fbea2df38ca84704ebf70ca2c78bb95884ec4c8cec186673da450b78947e

kernel-cross-headers-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e124526c19adfb4871624f19332b2590765d36727f5ef2a26e8da1001d5c7e94

kernel-debug-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2504e59da8a9f51c6d95a092ea18f4c3ad5f47961cd9e568d4dce8505943d58d

kernel-debug-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 74a2cd53ca3f0ba4c47093c9c29bb588d19f030b0dd1a72ac56b0b42d5fb8216

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 5283e7ff1b134e9df80c8f46e02f7388c98e49b46f7f1007fef3cfe92bf1a128

kernel-debug-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: cfcb121c1bdbcc872deeedb661bf8e0fbc73082f9dd04441900e267741a26e9f

kernel-debug-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 7dce4ad1b3d52f470280b4903c5c7186c2204b1a29197053f7428288bd88abd1

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 1f728aa5c29f88da2b486e234020d5f8db854978c06a1c7b3be1dbf2c8b8a1f8

kernel-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e24268f2fe645ce5a01a5b51249cef3ca06b22992890bca7f697e605bf4a5b60

kernel-debuginfo-common-s390x-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: f08127fb9d83791b601c46b231ab3867990a092f4647a6f49e6d62939cc07d28

kernel-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 96b063f2a47df985a86a28c6982aac4c739b57de764ff2bff6521b2bf781ce40

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: b8565bab3279f4ab6524142132be0ad8bc1c9bc1a3d1109e9637f8d4c7bffdb6

kernel-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: df26939a7565075433ca3122b0dd9c54a0e770a638e3e41d27016fa6361b252d

kernel-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 37805bb1fcd5a5180fbc1af18f04c63b4942144905567f65835af5148b4fd88a

kernel-tools-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 85bbf9d5ebda028ad51730dcc46411ca4e021be0af74d0401c6f30d3fc39a744

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: a1abe5460e7e4791ab1e12130c0c1be5057245544f1af27569da42bd8da57545

kernel-zfcpdump-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 41778a2d192cc04553ef8006bb18070d70647a71a9539b43e8f4b15967ae75ab

kernel-zfcpdump-core-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 920a5cd5db82029edcb98eb55857220e01c4146c477e22a1a7aef2f5a156a14a

kernel-zfcpdump-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: e1f3fbad41b79c5b216482935a7c4e640ff686fe6de6d586cd6c0bb1ccfcc221

kernel-zfcpdump-devel-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 00f930bf709e786691a7c41f181fa4e705845412ec2699218062ee96ad58d1fa

kernel-zfcpdump-modules-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: d368189071c9c01042951ada1e98845d5a45bdb0c6c36c3d67c79735f1761233

kernel-zfcpdump-modules-extra-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 99997b174fa98a2802359b2261f170788bcc8b66ef3084f1ca617f0b7cca7222

perf-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: c1c9bdbfe234938fac1f569a1547a03172575c51e4dfbc8c839d3f5b929f6cd1

perf-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 65df2506b432b37092db19dac7831b326b1c9915121c8e3b1574902d63ba5a77

python3-perf-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 2000d3ce9184a58e1cd52fe3108cbdd3b07a91bf440ae1e216773ef9c815dfaa

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.s390x.rpm

SHA-256: 89c826cb2005a6cb59357033328d83abc1e6668913d5d80919ad834954a45a56

Red Hat Enterprise Linux for Power, little endian 8

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

ppc64le

bpftool-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6e5aa032184ce105b0872cee2ee68a267bcbbdc1ec0b7c27d157a74015359b20

bpftool-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e943c1722c8b202e03ddf091926a7170c64e9757b04a11874e033b07adf27fe0

kernel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e88d80013bcc511c3b39ba0810d17c977665ec088ce347eb68a02261064d807c

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4efd006ae7c883b9006d925fb696dd2c81e4586493312107016faf8e89d805f7

kernel-cross-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 35be5d6ef8637a701829e814e2e8c0988fba20c04188520ddf4f72a7473ff78b

kernel-debug-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: cefab4d3b402545b74bf7a270e2faf3eb21243dfb446801d24a80cdabff3078b

kernel-debug-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 163cd58c9bc05bad7372807d7e2e54f08feb0f2a0c2ecd9ab5eef245b908cf6f

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 3e3748ecdbea6ed8af6168be85a694f623aa7ec4ae97b16681404d653e27e4f3

kernel-debug-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: fb6a48960f8278d2684a5e7dd5994a195efe5cf2ab1a77c1467a499479a8c46f

kernel-debug-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 44ddfe880ba809f3d499505a84fc9b49380cd53ac30ddaae5ad8d87b78a2dfa9

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 418bd5e5995289915c01a1519595903d27aca32966601d8a30b53cd47fd5d93c

kernel-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: f04dcc36e46e70d9893e1805d56b6bfa5eb65d45917900802638995218a4630e

kernel-debuginfo-common-ppc64le-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 2ee85dcc8e51515a4b70df42cee81bbdfd0871714d43469b985f43d6c586d13e

kernel-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 23b943448c073a715280971feaf930b4c8dad7a7fc276e278f30b823a4bcb25b

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 27c01f47ef4613d6423fb549f4db327cd2ac708dd191e111fa36eedb9011af71

kernel-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 51aeed7e754816ca5e34c0b986e451f76def0ac7720154c65175aa259580571b

kernel-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7a69bf0a3b614ee170170781793c243fdb0f438226660a67405d19dc4fc888ae

kernel-tools-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6d29bd0855729e7138e2d3d119c508d7bb933a0c0b5ca906eef8016a2ba952ba

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7438912a898d0aac67a4a8c045638ac253471f50a6e7267a8edf08065adf3f8f

kernel-tools-libs-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 34aed51dda95faf9831ad7b7418de2cf2aa31eeb28089d5d6b2cc493364f1494

perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 9796a15573b8d8a41e890a476586a9584611dfd928671ef514b20d4455660fe2

perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 92682cb72d84c81617c3266ab81eb452fded85a9866b45bbfa2b022227840e96

python3-perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4909cdd561270494e29575af1577544bc2a598da29cb86c03f32ee8fdce2647a

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4066d2f2d0e0b07d9e57280931db691c5773298bfec83365544233b6b22c72da

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

ppc64le

bpftool-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6e5aa032184ce105b0872cee2ee68a267bcbbdc1ec0b7c27d157a74015359b20

bpftool-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e943c1722c8b202e03ddf091926a7170c64e9757b04a11874e033b07adf27fe0

kernel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e88d80013bcc511c3b39ba0810d17c977665ec088ce347eb68a02261064d807c

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4efd006ae7c883b9006d925fb696dd2c81e4586493312107016faf8e89d805f7

kernel-cross-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 35be5d6ef8637a701829e814e2e8c0988fba20c04188520ddf4f72a7473ff78b

kernel-debug-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: cefab4d3b402545b74bf7a270e2faf3eb21243dfb446801d24a80cdabff3078b

kernel-debug-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 163cd58c9bc05bad7372807d7e2e54f08feb0f2a0c2ecd9ab5eef245b908cf6f

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 3e3748ecdbea6ed8af6168be85a694f623aa7ec4ae97b16681404d653e27e4f3

kernel-debug-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: fb6a48960f8278d2684a5e7dd5994a195efe5cf2ab1a77c1467a499479a8c46f

kernel-debug-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 44ddfe880ba809f3d499505a84fc9b49380cd53ac30ddaae5ad8d87b78a2dfa9

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 418bd5e5995289915c01a1519595903d27aca32966601d8a30b53cd47fd5d93c

kernel-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: f04dcc36e46e70d9893e1805d56b6bfa5eb65d45917900802638995218a4630e

kernel-debuginfo-common-ppc64le-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 2ee85dcc8e51515a4b70df42cee81bbdfd0871714d43469b985f43d6c586d13e

kernel-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 23b943448c073a715280971feaf930b4c8dad7a7fc276e278f30b823a4bcb25b

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 27c01f47ef4613d6423fb549f4db327cd2ac708dd191e111fa36eedb9011af71

kernel-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 51aeed7e754816ca5e34c0b986e451f76def0ac7720154c65175aa259580571b

kernel-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7a69bf0a3b614ee170170781793c243fdb0f438226660a67405d19dc4fc888ae

kernel-tools-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6d29bd0855729e7138e2d3d119c508d7bb933a0c0b5ca906eef8016a2ba952ba

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7438912a898d0aac67a4a8c045638ac253471f50a6e7267a8edf08065adf3f8f

kernel-tools-libs-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 34aed51dda95faf9831ad7b7418de2cf2aa31eeb28089d5d6b2cc493364f1494

perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 9796a15573b8d8a41e890a476586a9584611dfd928671ef514b20d4455660fe2

perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 92682cb72d84c81617c3266ab81eb452fded85a9866b45bbfa2b022227840e96

python3-perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4909cdd561270494e29575af1577544bc2a598da29cb86c03f32ee8fdce2647a

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4066d2f2d0e0b07d9e57280931db691c5773298bfec83365544233b6b22c72da

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

x86_64

bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1cd91e8ca4704eb34bccd83517368f489d2baeb6a130f5d535d0d8fa0bd6be8d

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d3fffcd41b359742dd7cb8059a7247dc2aa4c1d4098fcbe96e3ce4eed5d5b6d3

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 8f21e45ad60806d7c1d01ac3ff2ad652f4b2461afd40e2fec02cdf2aedb33dfc

kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7cc7d8af3b795bb28d71c1649279a574ab3719e6f799e4cc5091a7e49f77e0e6

kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 49da7baa3700c015b74a430a7943f0b2c11a80a0da99749963949b61753a4740

kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d034e3defe681b7889f501eb5e8ac7880e4553c61e2a2e3494494f7d0aa7d2b5

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: e438b60610f578f5a8049b6cfec407d0346be3ad562dcaf2295a7c8959125d17

kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 75e9d959867234a9b14d802da76fc391921f6d781b44299c4445e47afdddd49c

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: eda0fa5e7ef900e7bb10ec5d1d58dbf8e2e6d5817c8f27f58f4fe545197cf4cf

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: fd6c9c3ee80537be313229bdd3c42a7412679c3021ef55be5de79c032076e75e

kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 84c8213a1a19dfd642627835ef51ebcd957ca32f2dd436a056f4a8ff38db5f39

kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: c0424f3ad57bd18c9ef96b228f24f540bc4b36a4ad62eab0a15d106e6962f9df

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d69c996f311ef7532b27ccfd02cfdf4560a7621355e3c3ebd4e4dba2b0f5f55d

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d25b84ef02525f427aba874796473d2da1c3c6a63d38bcc24c9a4b61acff6ef1

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat Enterprise Linux for ARM 64 8

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

aarch64

bpftool-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 5db3dcc69d659dc7ca9f9cc348957ddc19da04d628c60cc31f90120457e4e7f4

bpftool-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 60a257b86c3475dca34c12905421f6c02468d7461e58fbf2cffb1369603669bf

kernel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: a40603c1eec9682cd941b3c6bf7b1028a53ffaea9803a4874e41a8f240188aee

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f4ec2d0449d5f1be1879c2e6bc3739bb548f6fc178046d6e53a84ca322806345

kernel-cross-headers-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 25dade708fd915b9003b68fec4a093a662e5d2e1f9901b744bd86b2e4d5fa26d

kernel-debug-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 708f9affd98da819a9cc42b6ef42cd9cf5399b616ce64ddcbb357abb09d87112

kernel-debug-core-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0d1d094096350b3a2ca22be51787343783f6bdc9c42473c538b244272396ae1d

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4d1c7ff2814d96cc7d27d95eb9c5382192cc7c6c6ba95e1a469b727bfb0e82b0

kernel-debug-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 54e348f3d33f853adb188db98996a0daf1b5fd0fa81e8816ba13be4f193c6d60

kernel-debug-modules-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: c7768062db7f276bf7d741a35acfe3db82282f12944f4a821a8efab8ffb861ba

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 409bb3aff53d9391f8cc9d3b1603782f9f6384f10d1031a320e8c16698cdc0fd

kernel-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: b9e7a6872614258707be902a9c1d74aa46d08284949106978fa68d9ccd72fe4b

kernel-debuginfo-common-aarch64-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 8723e5196226e3280c3b9e0e53b7a458e36b81fcc18df7ad7f7e0ff197c11183

kernel-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: e703b2c72cb467e11b94a27f8fd667f2f7f5ed55860040ecc1fac364c86dc010

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: e98f7b6b124b24d87b032f926849f221d7d60ccd94b1b2c6093c7e6e38c07d41

kernel-modules-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 18397b059ae2ba91eceb8ba87b724beb1dae08ac9090cb7d9b529e98cc257d50

kernel-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 7315e3e2015d6a7a7a20799f9f5e1e8e8789bcc600a0812a0f48299ef7ac006e

kernel-tools-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: cdde55247f5a53c808595a032ba431a5e7b4cc57a8db660441892be988db181b

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f7e914654b200da42f5fe1d7058eb9d57336d260d6aa5c05578dcfcbe6a85f79

kernel-tools-libs-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 763449cb7042c2509c1a597d5c8e914e34d30cce20a84239a63a901c4552a6fa

perf-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: eece1479991e27be29c6519f4cf39801eaaa012f29d35055ca18544c25bc9f71

perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0abe865d4074910bca419dbe98e6f22ad82347f708e1926e6269ed7546a01356

python3-perf-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 15b6696e5f76fc402b6040c18b93fda955a956a81bc9ea1c142639831058d068

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4dbe2d01963805d6d8fab0cb1cd065ec6d3084e25a383ff3ccc4eebf5a4bf27c

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

ppc64le

bpftool-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6e5aa032184ce105b0872cee2ee68a267bcbbdc1ec0b7c27d157a74015359b20

bpftool-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e943c1722c8b202e03ddf091926a7170c64e9757b04a11874e033b07adf27fe0

kernel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e88d80013bcc511c3b39ba0810d17c977665ec088ce347eb68a02261064d807c

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4efd006ae7c883b9006d925fb696dd2c81e4586493312107016faf8e89d805f7

kernel-cross-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 35be5d6ef8637a701829e814e2e8c0988fba20c04188520ddf4f72a7473ff78b

kernel-debug-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: cefab4d3b402545b74bf7a270e2faf3eb21243dfb446801d24a80cdabff3078b

kernel-debug-core-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 163cd58c9bc05bad7372807d7e2e54f08feb0f2a0c2ecd9ab5eef245b908cf6f

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 3e3748ecdbea6ed8af6168be85a694f623aa7ec4ae97b16681404d653e27e4f3

kernel-debug-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: fb6a48960f8278d2684a5e7dd5994a195efe5cf2ab1a77c1467a499479a8c46f

kernel-debug-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 44ddfe880ba809f3d499505a84fc9b49380cd53ac30ddaae5ad8d87b78a2dfa9

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 418bd5e5995289915c01a1519595903d27aca32966601d8a30b53cd47fd5d93c

kernel-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: f04dcc36e46e70d9893e1805d56b6bfa5eb65d45917900802638995218a4630e

kernel-debuginfo-common-ppc64le-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 2ee85dcc8e51515a4b70df42cee81bbdfd0871714d43469b985f43d6c586d13e

kernel-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 23b943448c073a715280971feaf930b4c8dad7a7fc276e278f30b823a4bcb25b

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 27c01f47ef4613d6423fb549f4db327cd2ac708dd191e111fa36eedb9011af71

kernel-modules-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 51aeed7e754816ca5e34c0b986e451f76def0ac7720154c65175aa259580571b

kernel-modules-extra-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7a69bf0a3b614ee170170781793c243fdb0f438226660a67405d19dc4fc888ae

kernel-tools-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 6d29bd0855729e7138e2d3d119c508d7bb933a0c0b5ca906eef8016a2ba952ba

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7438912a898d0aac67a4a8c045638ac253471f50a6e7267a8edf08065adf3f8f

kernel-tools-libs-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 34aed51dda95faf9831ad7b7418de2cf2aa31eeb28089d5d6b2cc493364f1494

perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 9796a15573b8d8a41e890a476586a9584611dfd928671ef514b20d4455660fe2

perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 92682cb72d84c81617c3266ab81eb452fded85a9866b45bbfa2b022227840e96

python3-perf-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4909cdd561270494e29575af1577544bc2a598da29cb86c03f32ee8fdce2647a

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4066d2f2d0e0b07d9e57280931db691c5773298bfec83365544233b6b22c72da

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

x86_64

bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1cd91e8ca4704eb34bccd83517368f489d2baeb6a130f5d535d0d8fa0bd6be8d

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d3fffcd41b359742dd7cb8059a7247dc2aa4c1d4098fcbe96e3ce4eed5d5b6d3

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 8f21e45ad60806d7c1d01ac3ff2ad652f4b2461afd40e2fec02cdf2aedb33dfc

kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7cc7d8af3b795bb28d71c1649279a574ab3719e6f799e4cc5091a7e49f77e0e6

kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 49da7baa3700c015b74a430a7943f0b2c11a80a0da99749963949b61753a4740

kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d034e3defe681b7889f501eb5e8ac7880e4553c61e2a2e3494494f7d0aa7d2b5

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: e438b60610f578f5a8049b6cfec407d0346be3ad562dcaf2295a7c8959125d17

kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 75e9d959867234a9b14d802da76fc391921f6d781b44299c4445e47afdddd49c

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: eda0fa5e7ef900e7bb10ec5d1d58dbf8e2e6d5817c8f27f58f4fe545197cf4cf

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: bfe653328263858434fee4f634952f169dc5f8e5dd5b9d751176090757b9ff87

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 16438442b15741f47330c696bf83258ce89a29a36fb25abd37df8075da48f70d

kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: fd6c9c3ee80537be313229bdd3c42a7412679c3021ef55be5de79c032076e75e

kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 84c8213a1a19dfd642627835ef51ebcd957ca32f2dd436a056f4a8ff38db5f39

kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: c0424f3ad57bd18c9ef96b228f24f540bc4b36a4ad62eab0a15d106e6962f9df

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d69c996f311ef7532b27ccfd02cfdf4560a7621355e3c3ebd4e4dba2b0f5f55d

perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: f8454f3f5d59d34c26fb4ec0c6ff2fa67da4b1c3a71175a8ad601c5243075c29

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: d25b84ef02525f427aba874796473d2da1c3c6a63d38bcc24c9a4b61acff6ef1

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat CodeReady Linux Builder for x86_64 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1bf629801f9e51a5146a98aecf3d5e14319c11837decea1beae5ed7fcbef66de

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e943c1722c8b202e03ddf091926a7170c64e9757b04a11874e033b07adf27fe0

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 3e3748ecdbea6ed8af6168be85a694f623aa7ec4ae97b16681404d653e27e4f3

kernel-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: f04dcc36e46e70d9893e1805d56b6bfa5eb65d45917900802638995218a4630e

kernel-debuginfo-common-ppc64le-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 2ee85dcc8e51515a4b70df42cee81bbdfd0871714d43469b985f43d6c586d13e

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7438912a898d0aac67a4a8c045638ac253471f50a6e7267a8edf08065adf3f8f

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4d9e2eed975109da8e6a561ca487b69a996f66e90473e8becf82b9a7af373b57

perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 92682cb72d84c81617c3266ab81eb452fded85a9866b45bbfa2b022227840e96

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4066d2f2d0e0b07d9e57280931db691c5773298bfec83365544233b6b22c72da

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 60a257b86c3475dca34c12905421f6c02468d7461e58fbf2cffb1369603669bf

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4d1c7ff2814d96cc7d27d95eb9c5382192cc7c6c6ba95e1a469b727bfb0e82b0

kernel-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: b9e7a6872614258707be902a9c1d74aa46d08284949106978fa68d9ccd72fe4b

kernel-debuginfo-common-aarch64-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 8723e5196226e3280c3b9e0e53b7a458e36b81fcc18df7ad7f7e0ff197c11183

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f7e914654b200da42f5fe1d7058eb9d57336d260d6aa5c05578dcfcbe6a85f79

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: d2b3f1e6a83509c463291dad73f360589468bd534adef530f16630ff71f5e9ee

perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0abe865d4074910bca419dbe98e6f22ad82347f708e1926e6269ed7546a01356

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4dbe2d01963805d6d8fab0cb1cd065ec6d3084e25a383ff3ccc4eebf5a4bf27c

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.16.1.el8_6.src.rpm

SHA-256: 6e0bc3db153ff9cd605f5660ab8dbc5021d032a7af5a86bfa6affe991ab8625f

aarch64

bpftool-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 5db3dcc69d659dc7ca9f9cc348957ddc19da04d628c60cc31f90120457e4e7f4

bpftool-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 60a257b86c3475dca34c12905421f6c02468d7461e58fbf2cffb1369603669bf

kernel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: a40603c1eec9682cd941b3c6bf7b1028a53ffaea9803a4874e41a8f240188aee

kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: cd556ebf64f5b39dad86ee549198c7929e0422245d07cc84081f159ae97a2fcb

kernel-core-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f4ec2d0449d5f1be1879c2e6bc3739bb548f6fc178046d6e53a84ca322806345

kernel-cross-headers-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 25dade708fd915b9003b68fec4a093a662e5d2e1f9901b744bd86b2e4d5fa26d

kernel-debug-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 708f9affd98da819a9cc42b6ef42cd9cf5399b616ce64ddcbb357abb09d87112

kernel-debug-core-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0d1d094096350b3a2ca22be51787343783f6bdc9c42473c538b244272396ae1d

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4d1c7ff2814d96cc7d27d95eb9c5382192cc7c6c6ba95e1a469b727bfb0e82b0

kernel-debug-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 54e348f3d33f853adb188db98996a0daf1b5fd0fa81e8816ba13be4f193c6d60

kernel-debug-modules-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: c7768062db7f276bf7d741a35acfe3db82282f12944f4a821a8efab8ffb861ba

kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 409bb3aff53d9391f8cc9d3b1603782f9f6384f10d1031a320e8c16698cdc0fd

kernel-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: b9e7a6872614258707be902a9c1d74aa46d08284949106978fa68d9ccd72fe4b

kernel-debuginfo-common-aarch64-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 8723e5196226e3280c3b9e0e53b7a458e36b81fcc18df7ad7f7e0ff197c11183

kernel-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: e703b2c72cb467e11b94a27f8fd667f2f7f5ed55860040ecc1fac364c86dc010

kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm

SHA-256: e591b0ae995b2d6f748af9839f327486c7a9c7d2a0a549966373a899ed45e5ee

kernel-headers-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: e98f7b6b124b24d87b032f926849f221d7d60ccd94b1b2c6093c7e6e38c07d41

kernel-modules-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 18397b059ae2ba91eceb8ba87b724beb1dae08ac9090cb7d9b529e98cc257d50

kernel-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 7315e3e2015d6a7a7a20799f9f5e1e8e8789bcc600a0812a0f48299ef7ac006e

kernel-tools-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: cdde55247f5a53c808595a032ba431a5e7b4cc57a8db660441892be988db181b

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f7e914654b200da42f5fe1d7058eb9d57336d260d6aa5c05578dcfcbe6a85f79

kernel-tools-libs-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 763449cb7042c2509c1a597d5c8e914e34d30cce20a84239a63a901c4552a6fa

perf-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: eece1479991e27be29c6519f4cf39801eaaa012f29d35055ca18544c25bc9f71

perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0abe865d4074910bca419dbe98e6f22ad82347f708e1926e6269ed7546a01356

python3-perf-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 15b6696e5f76fc402b6040c18b93fda955a956a81bc9ea1c142639831058d068

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4dbe2d01963805d6d8fab0cb1cd065ec6d3084e25a383ff3ccc4eebf5a4bf27c

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 38097ab512e955970a60c6fd3c6c1c606fd0887120e765b19b55a90c7e7b8bab

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: b3c2c837517160aecefe19e6e8960f5ddb3069b887f4fd0a08de7b953c287691

kernel-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9ee5e0a8322bfd449b43a289949fd6c02a3a3c19454bf0a5278161c2395f1749

kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 9f9a53855fa1c49649927edeff7cc157cf37772a5a7987116259f1793647deed

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7914341529573844380a6de1bdc137154fc613b25e7b4d0533f1cc89c9a944ea

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 1bf629801f9e51a5146a98aecf3d5e14319c11837decea1beae5ed7fcbef66de

perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: 7742c3c60b5b7a6e0f1c266eac371dd71e1f5b0ed6fa67bfca1cdc5c7aae0162

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.x86_64.rpm

SHA-256: cbd78eae02ca574108bbb754a2d060e43a85ceba52b40f98ce3e14e21bbd84f7

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: e943c1722c8b202e03ddf091926a7170c64e9757b04a11874e033b07adf27fe0

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 3e3748ecdbea6ed8af6168be85a694f623aa7ec4ae97b16681404d653e27e4f3

kernel-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: f04dcc36e46e70d9893e1805d56b6bfa5eb65d45917900802638995218a4630e

kernel-debuginfo-common-ppc64le-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 2ee85dcc8e51515a4b70df42cee81bbdfd0871714d43469b985f43d6c586d13e

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 7438912a898d0aac67a4a8c045638ac253471f50a6e7267a8edf08065adf3f8f

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4d9e2eed975109da8e6a561ca487b69a996f66e90473e8becf82b9a7af373b57

perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 92682cb72d84c81617c3266ab81eb452fded85a9866b45bbfa2b022227840e96

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.ppc64le.rpm

SHA-256: 4066d2f2d0e0b07d9e57280931db691c5773298bfec83365544233b6b22c72da

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 60a257b86c3475dca34c12905421f6c02468d7461e58fbf2cffb1369603669bf

kernel-debug-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4d1c7ff2814d96cc7d27d95eb9c5382192cc7c6c6ba95e1a469b727bfb0e82b0

kernel-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: b9e7a6872614258707be902a9c1d74aa46d08284949106978fa68d9ccd72fe4b

kernel-debuginfo-common-aarch64-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 8723e5196226e3280c3b9e0e53b7a458e36b81fcc18df7ad7f7e0ff197c11183

kernel-tools-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: f7e914654b200da42f5fe1d7058eb9d57336d260d6aa5c05578dcfcbe6a85f79

kernel-tools-libs-devel-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: d2b3f1e6a83509c463291dad73f360589468bd534adef530f16630ff71f5e9ee

perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 0abe865d4074910bca419dbe98e6f22ad82347f708e1926e6269ed7546a01356

python3-perf-debuginfo-4.18.0-372.16.1.el8_6.aarch64.rpm

SHA-256: 4dbe2d01963805d6d8fab0cb1cd065ec6d3084e25a383ff3ccc4eebf5a4bf27c

Related news

Ubuntu Security Notice USN-5647-1

Ubuntu Security Notice 5647-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5630-1

Ubuntu Security Notice 5630-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5623-1

Ubuntu Security Notice 5623-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2022:6432: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Ubuntu Security Notice USN-5602-1

Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

CVE-2022-1729: security - CVE-2022-1729: race condition in Linux perf subsystem leads to local privilege escalation

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

RHSA-2022:6053: Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update

Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:5879: Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key

Red Hat Security Advisory 2022-5806-01

Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5806: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5636-01

Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5626: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-2022-1...

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5565: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5232-01

Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5232: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.