Headline
RHSA-2022:6983: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-45485: kernel: information leak in the IPv6 implementation
- CVE-2021-45486: kernel: information leak in the IPv4 implementation
- CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
- CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)
- CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)
- CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The following packages have been upgraded to a later upstream version: kernel (4.18.0).
Security Fix(es):
- A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
- Information leak in the IPv6 implementation (CVE-2021-45485)
- Information leak in the IPv4 implementation (CVE-2021-45486)
- Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
- Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
- Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- DR, Ignore modify TTL if ConnectX-5 doesn’t support it (BZ#2075549)
- execve exit tracepoint not called (BZ#2106663)
- Unable to boot RHEL-8.6 on Brazos max. config (Install is success) (BZ#2107475)
- “vmcore failed, _exitcode:139” error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107490)
- soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110773)
- Allow substituting custom vmlinux.h for the build (BZ#2116407)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2039911 - CVE-2021-45485 kernel: information leak in the IPv6 implementation
- BZ - 2039914 - CVE-2021-45486 kernel: information leak in the IPv4 implementation
- BZ - 2090237 - CVE-2022-21123 hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR)
- BZ - 2090240 - CVE-2022-21125 hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS)
- BZ - 2090241 - CVE-2022-21166 hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
- BZ - 2114849 - CVE-2022-2588 kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
CVEs
- CVE-2021-45485
- CVE-2021-45486
- CVE-2022-2588
- CVE-2022-21123
- CVE-2022-21125
- CVE-2022-21166
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
x86_64
bpftool-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: cf71e4556c8f34bcf8630e189b331b07489e94d27d1e38b33e518bbbefae7b6b
bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 34b1c81a23d81cde5d791a788b2cb3fa207e11bf858b1d6583c6c19aa768453d
kernel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 30d18bf99b7a32fd4e40e82a10bbee56f34433d6b53c8f2159cf1da456219aa0
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: b2b5b72a7d7d3ef0af98321011cd3a249ae9f9991e15b4ef6b4867b2bf78eb6c
kernel-cross-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: be1b8894ca84d86c643e80e67d5d8b7ad769518c62ce3bd5d6acd310b0b78ba6
kernel-debug-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 3d8513ebba1f3755586e8c9f9c7d1e95b99ac527a2fa9f113424cb4ff71e19db
kernel-debug-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: e854fefaaecf4958f3e76334024c5869a73b7b14297092ceda47fdf0c19df6a7
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a03bffcb2799bdfacb58f1accc5cfc157630124d4221f70c085e8c356ce2f858
kernel-debug-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 68fd3cbb17a950a9eb1eeabaff35dd8ce2b0e967b5b93ad7139639307d62b480
kernel-debug-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a42aa73cafe49cbf6f0abac0d423ddef23c9e48a085fdff355b74cd8e39b737c
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8a5c040c05222748affd59e3e2ba29896cf43ff9acb3627146df7c5e9057572a
kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: ab465942626f17ea742ba529f899fbc3f7a167869a833509c75eb97777691361
kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 6f2a6bcdcdb42e5be26d982a493555499176cf6126da402d3ba5e980e069e423
kernel-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: fce408d47e73a9df9d2935c5770719cddc81f5af66bf26284ee50b2a579f6eac
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 9358c272eb6e4bc290c31f7c5d73d6d35fb6ddd1bafb756909bcbe1c577b336b
kernel-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8aac8fb3c2a1a6fcb75b1fa4ca434e92e5763e78d5c3d4bd3d2345670f11d6bc
kernel-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: aeb5a029345491f2d2e035f73be03aad63991bbf28ab6a378e74272716d8b3a1
kernel-tools-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 7e5cf591fb8817cedb62f17cf0be6bd4146be90093e1065740322a684afcc60f
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 80cfbfc0544e71bad1c5c3f277546a4ec3fa44b54090c4cd2daa221ef058d282
kernel-tools-libs-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 088fa07dc2e2405b078830e2a6946e058f912469b56508344ad6b4a95877080f
perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 4b6046f91955802d035dca94967b94531f441d61f3b239669e727ceb861245d5
perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c2d48f6487ebd063b71231eb3ec8038ec9e54b780b5502e09312e3434abc19c3
python3-perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c1cf85a7c5e1b1ac3665643c39d9449bfa0911191f53052e7dde578d008f9b3c
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a90d408008cac6a532dc04d00392cafc2268146df062f936b9690d75aa4e709d
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
x86_64
bpftool-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: cf71e4556c8f34bcf8630e189b331b07489e94d27d1e38b33e518bbbefae7b6b
bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 34b1c81a23d81cde5d791a788b2cb3fa207e11bf858b1d6583c6c19aa768453d
kernel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 30d18bf99b7a32fd4e40e82a10bbee56f34433d6b53c8f2159cf1da456219aa0
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: b2b5b72a7d7d3ef0af98321011cd3a249ae9f9991e15b4ef6b4867b2bf78eb6c
kernel-cross-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: be1b8894ca84d86c643e80e67d5d8b7ad769518c62ce3bd5d6acd310b0b78ba6
kernel-debug-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 3d8513ebba1f3755586e8c9f9c7d1e95b99ac527a2fa9f113424cb4ff71e19db
kernel-debug-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: e854fefaaecf4958f3e76334024c5869a73b7b14297092ceda47fdf0c19df6a7
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a03bffcb2799bdfacb58f1accc5cfc157630124d4221f70c085e8c356ce2f858
kernel-debug-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 68fd3cbb17a950a9eb1eeabaff35dd8ce2b0e967b5b93ad7139639307d62b480
kernel-debug-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a42aa73cafe49cbf6f0abac0d423ddef23c9e48a085fdff355b74cd8e39b737c
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8a5c040c05222748affd59e3e2ba29896cf43ff9acb3627146df7c5e9057572a
kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: ab465942626f17ea742ba529f899fbc3f7a167869a833509c75eb97777691361
kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 6f2a6bcdcdb42e5be26d982a493555499176cf6126da402d3ba5e980e069e423
kernel-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: fce408d47e73a9df9d2935c5770719cddc81f5af66bf26284ee50b2a579f6eac
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 9358c272eb6e4bc290c31f7c5d73d6d35fb6ddd1bafb756909bcbe1c577b336b
kernel-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8aac8fb3c2a1a6fcb75b1fa4ca434e92e5763e78d5c3d4bd3d2345670f11d6bc
kernel-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: aeb5a029345491f2d2e035f73be03aad63991bbf28ab6a378e74272716d8b3a1
kernel-tools-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 7e5cf591fb8817cedb62f17cf0be6bd4146be90093e1065740322a684afcc60f
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 80cfbfc0544e71bad1c5c3f277546a4ec3fa44b54090c4cd2daa221ef058d282
kernel-tools-libs-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 088fa07dc2e2405b078830e2a6946e058f912469b56508344ad6b4a95877080f
perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 4b6046f91955802d035dca94967b94531f441d61f3b239669e727ceb861245d5
perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c2d48f6487ebd063b71231eb3ec8038ec9e54b780b5502e09312e3434abc19c3
python3-perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c1cf85a7c5e1b1ac3665643c39d9449bfa0911191f53052e7dde578d008f9b3c
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a90d408008cac6a532dc04d00392cafc2268146df062f936b9690d75aa4e709d
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
s390x
bpftool-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 218563eb1dc4f958d56cb1f92c40a26d267685e047a1d9b3418550e58b426ef5
bpftool-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: ca5aa721e4010f6ac24a845e5a0d15d787285eed9be37413f1e55e1dd63a1264
kernel-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 59b4782c1fadf731a1870ea22080b23555f4bd07f99578484806c7ae5f97622d
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 404d8f674e204cf67ca848fcecd57b9851612218e5db83b78168821063c8a864
kernel-cross-headers-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 770eac00ea5c83e8984b99fd13d5a2e08382acdf4c4793b934d50966cc1ec619
kernel-debug-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 6b167c2934ef4bfe0bb2fe32a23cce9408591e0bd87c8bd506e5b6cb0404e8a9
kernel-debug-core-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: ad6ef32a53dee9ee17a0e6e4c98882ee0b44923c6aaf1c8b203398d1c3cda99c
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 2113342b5f0e4e80f6651bcc3803573f627cbce3326b9df3fb80d9b6ce5a7b3e
kernel-debug-devel-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 32d4d713d0214c76394d0194f12703e548aa83c199096bfe7545e0006f44660d
kernel-debug-modules-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: da15183e6d24ca9d3c9c8713cdb3163c4d616e3fc55805717b2632452239f9c7
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 76c70dbf69d041bea005684650d1f06dc72a3526545cc67a90bcd7af64b6e89a
kernel-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 7a9ed30715762114587a1abce49a2507541cfc9f993d9439a3b59130a208a893
kernel-debuginfo-common-s390x-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: be5d210783a6afb3f53ba6bfba7472a75aa6ce8b86909e31646db9a458d8d1dd
kernel-devel-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 2ab0e84c3d3021fa16ca1eb03bd01b4bf32d31f9e9781c59a17f4f9c95c9501b
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 3359b7165c07104d5583213792ad83b0d056cb873bdc39f7eaa328279e53c4a1
kernel-modules-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: b938cbdc1fac5d403760f1072548a61210a674e9a2d5df85046c7ddbc9e1d498
kernel-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: a5df7f8811c9d99a0a9076715a92a10715f16a8d9c822e8035e67fe63fbba080
kernel-tools-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: fa1d223c950a6d242fb4ce694be4152328382119076da9b48e84b5eb61a9763d
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: cc520f9f723991d554694a66fed81607c4a441ecf8cdd5c7e92fae2374237731
kernel-zfcpdump-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 34ad266dbca7e6cd1086785b678ca0fe76687ad1ee6f2a24f8fa609a1116d5c9
kernel-zfcpdump-core-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 6a637e08553fc7fdc74879ac53119e245d12aa99edb93374f99998e28f67b748
kernel-zfcpdump-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: a41216afac4f37fee2240b886a4ffe6daa8f96495e627258477fd7c357d1cac9
kernel-zfcpdump-devel-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: d84291831c7c62dbbf98e8e1b2df1961728619930670ee8ee2adc0693b2b474c
kernel-zfcpdump-modules-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: f2e8fb2a2707688683af47ad5de840dbf37d6bf5c2047d958ba1ff04acceabdf
kernel-zfcpdump-modules-extra-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 3eb33d6bba15e51e8936bd6849ffa7cfebcbf0ec7c21928d2d04fb141807effb
perf-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 3b7c11bd3c72e75d7ac4acd09d390137ef1f94598b5c7498dd2d56ef64d8fa91
perf-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 90fabf7f978277baae3cbda79638ba6dec5fe5019bb43f8d2a49ef927bc01293
python3-perf-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 5fd6cd583961cef3f13e1fc20d0261cfd6b00dacf956aa810054bc13bfbe9385
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.s390x.rpm
SHA-256: 7ddb8da6fd9f9b35905ee1113a24e70fb6dd6ae321357591f111cb7d1900e59d
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
ppc64le
bpftool-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f133c4c0544cc11a717ea33cf3d2a801732c3193655b9d57dc518d2a0a1831ed
bpftool-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 6772405d65429f4f8667cd64aa1e0badc6ebbf8f55ca2c70bef5436bb86e0665
kernel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f9187a07ec7f904085a0753c496dbe2bf26d30f062be16b76e327c086d650401
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 73e60eb9482253dd563c6ab1cecfa697d66fbeb5c038235c990bac89ba25159d
kernel-cross-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 7f9a1867dcc05c92eadc4c523c2e7c273f71bcf15b06d11aa3557f367ef13279
kernel-debug-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f740035db0fcdc6a5066638e0cd2607e240b7756bec9f15b24c60bd04d1e6d29
kernel-debug-core-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 13b2d80d128176ea511f7fcbb20faa8b0ae5a2f6f478d5990e6dd0c936f3ce94
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: b1c81aceef67911f337d4ab417cdf614b1dfa4f434aef1d9f2ce0943c59e329c
kernel-debug-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 08fcbba47a9ac07edf4c9a9edcb99001ccfb289a0bf86fcb97abb45ad0f63e2b
kernel-debug-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 371837cec269e779ce18b97b29eb02566653815f0cab0fd8578a5841ee099e54
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 91dc3c10db61377d78030a24b9960bdc548ffb8f11084091e6c42cb777485211
kernel-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d5aa66a50f5737afdcca84a37a520976a40cd5b0e203f5426caa871027991387
kernel-debuginfo-common-ppc64le-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f1a01dbb26b0c22a10981b7e1375f1b0ef80986cdbee229d5cfa951141d40d7e
kernel-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 7fa16efae2c6de19071a0204c3e3072661b671eb6b97dce84fdad0ee121c88bd
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: c29ae479b4651e69ae7ac42ac226ecbf74022b1167574d76fdcd0522deb3e8fe
kernel-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 989af4d0b0839497cb6d8c3d7bca173bfb4171d98f3af1647e57cf84d1282337
kernel-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d7a375304e8ad5c8c13aa09812f1843e965ab78d4994cdfbf0ba0c2b071b7b37
kernel-tools-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d8e7b6007d21481c63a8c2b8942697321df9887ae4a5969144007ee9378a5fc3
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 4fecfc8ab1fceafc734aaca4a8807cc2212fd96c19437c2b08d4e56bd5d51b82
kernel-tools-libs-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 0b69f006a09f65dc720ed47bbdbf49c1f4c8170ffb0df3a70022bb663d5efd29
perf-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 46e5f6a77d46106833d8342d3549a1d7272b094bc4fbf1ac51e7379d6b4a5058
perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d7d6a4b821a088ff654137a0eec0ef24dd8c2f8b6c4b321080decc7bb0e668c6
python3-perf-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 1db1081b772734827b9dd30b9c7a0861302736796472ae109d2414d460919e8a
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f9e6b76c19c878e647e07b6fb9db2049da13a5e1d5e0d99a1e222e67292090c4
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
x86_64
bpftool-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: cf71e4556c8f34bcf8630e189b331b07489e94d27d1e38b33e518bbbefae7b6b
bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 34b1c81a23d81cde5d791a788b2cb3fa207e11bf858b1d6583c6c19aa768453d
kernel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 30d18bf99b7a32fd4e40e82a10bbee56f34433d6b53c8f2159cf1da456219aa0
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: b2b5b72a7d7d3ef0af98321011cd3a249ae9f9991e15b4ef6b4867b2bf78eb6c
kernel-cross-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: be1b8894ca84d86c643e80e67d5d8b7ad769518c62ce3bd5d6acd310b0b78ba6
kernel-debug-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 3d8513ebba1f3755586e8c9f9c7d1e95b99ac527a2fa9f113424cb4ff71e19db
kernel-debug-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: e854fefaaecf4958f3e76334024c5869a73b7b14297092ceda47fdf0c19df6a7
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a03bffcb2799bdfacb58f1accc5cfc157630124d4221f70c085e8c356ce2f858
kernel-debug-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 68fd3cbb17a950a9eb1eeabaff35dd8ce2b0e967b5b93ad7139639307d62b480
kernel-debug-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a42aa73cafe49cbf6f0abac0d423ddef23c9e48a085fdff355b74cd8e39b737c
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8a5c040c05222748affd59e3e2ba29896cf43ff9acb3627146df7c5e9057572a
kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: ab465942626f17ea742ba529f899fbc3f7a167869a833509c75eb97777691361
kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 6f2a6bcdcdb42e5be26d982a493555499176cf6126da402d3ba5e980e069e423
kernel-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: fce408d47e73a9df9d2935c5770719cddc81f5af66bf26284ee50b2a579f6eac
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 9358c272eb6e4bc290c31f7c5d73d6d35fb6ddd1bafb756909bcbe1c577b336b
kernel-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8aac8fb3c2a1a6fcb75b1fa4ca434e92e5763e78d5c3d4bd3d2345670f11d6bc
kernel-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: aeb5a029345491f2d2e035f73be03aad63991bbf28ab6a378e74272716d8b3a1
kernel-tools-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 7e5cf591fb8817cedb62f17cf0be6bd4146be90093e1065740322a684afcc60f
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 80cfbfc0544e71bad1c5c3f277546a4ec3fa44b54090c4cd2daa221ef058d282
kernel-tools-libs-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 088fa07dc2e2405b078830e2a6946e058f912469b56508344ad6b4a95877080f
perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 4b6046f91955802d035dca94967b94531f441d61f3b239669e727ceb861245d5
perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c2d48f6487ebd063b71231eb3ec8038ec9e54b780b5502e09312e3434abc19c3
python3-perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c1cf85a7c5e1b1ac3665643c39d9449bfa0911191f53052e7dde578d008f9b3c
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a90d408008cac6a532dc04d00392cafc2268146df062f936b9690d75aa4e709d
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
aarch64
bpftool-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: cb5783fe25b0f8d49fbb547c0cfa9a6fbcbbd1d77bd7aa3aea92b9331caca006
bpftool-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: ea64fca34661cde7daeef9d99dd3774590eb8f8c53ee607e7f6c296d12cda8d2
kernel-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: fc23ac170985672e85c917afed8ef52e912898ef9eddf2d9aa6097e04dbca8ab
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 45643ba75d3bdc4c4e80a9d8c8dfcc30b757c22ef76123b2b9e17b671d1a6cfe
kernel-cross-headers-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: b9cc789034477985d35d1867f12621d03e13715450a4d4517f9578b6dd592346
kernel-debug-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 7ff85c55c4eba35078fdf8c44fafbdca8bae08b23e0109251d185af02789fac4
kernel-debug-core-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 258f14eb0de093ea00ad49fe86de4ce58c74ad944ef424c19d565ddb9a03de59
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: f92f74678cd177aa4b72728ac6a6cb3186d5339f908dd64a30b5a9239d43d7de
kernel-debug-devel-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: acd49ec652bc719b5ae032fb94b819dcd2eae052ddc91d0667e9340bdf223ce5
kernel-debug-modules-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 9c2cd327d103b23ca13e1c09d1c71922c7ed396f84efd52d6dd8160f303ff7fd
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: d171fdf8eb85b4eeb2561abb917a1f6de05b0f784a9f2ddd710d4cd90eecd108
kernel-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 88a89648317429027bc2ca67d47b3ac614febe3b6945b40339db162a646b4607
kernel-debuginfo-common-aarch64-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 06d93822fb7f2f3c97c45ba6bdb4d35882a69f08cf76657e32a9ba509335a670
kernel-devel-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 8b9ecc0498abaf49c94337ee77c9441f3618c90d557c36846a4c802b34d958d0
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 4dc05dfe5f177e4b7de5ef43232b4435edcc39dcf554cee238b2c2c05dce400d
kernel-modules-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 69b4fb23433cd6927aa15e9137f9cc79788131e303c28b3d33ad998cdc7cf91f
kernel-modules-extra-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 6f15d6e84dff37e3074d4e5178ee21041cb99b8a01970bd9688409e784a2df6e
kernel-tools-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: d7b72448d4019a1a80284ca6e96c1f62da14c28d09067cd4095dd947b2e20787
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 5732b568cbf2b7acc33aef5b197e46844f6e0b82b11504fc8ca6f6e33fe451ff
kernel-tools-libs-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 896f77f90a46cf4d6b80b65e4f0db312da7eb0e6bff5a8c6150773174ddf251d
perf-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 8007bffff548dc179e48b0c037dd1f52bf862563684653f399ea12b8032fb073
perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: bbc0cd3c0fd85c619b671d71c5df45fc9352a1d5db9d6259282c94327cf05612
python3-perf-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 029635dce10e34a6f5d5f997359c107b86dc493db9012486df23b8c3ac1bf0b7
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: d8c9b749d18ab9d7a0a9dcb1d8e086c750c9e953993bcd8d43797bf9c0fbd456
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
ppc64le
bpftool-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f133c4c0544cc11a717ea33cf3d2a801732c3193655b9d57dc518d2a0a1831ed
bpftool-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 6772405d65429f4f8667cd64aa1e0badc6ebbf8f55ca2c70bef5436bb86e0665
kernel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f9187a07ec7f904085a0753c496dbe2bf26d30f062be16b76e327c086d650401
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 73e60eb9482253dd563c6ab1cecfa697d66fbeb5c038235c990bac89ba25159d
kernel-cross-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 7f9a1867dcc05c92eadc4c523c2e7c273f71bcf15b06d11aa3557f367ef13279
kernel-debug-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f740035db0fcdc6a5066638e0cd2607e240b7756bec9f15b24c60bd04d1e6d29
kernel-debug-core-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 13b2d80d128176ea511f7fcbb20faa8b0ae5a2f6f478d5990e6dd0c936f3ce94
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: b1c81aceef67911f337d4ab417cdf614b1dfa4f434aef1d9f2ce0943c59e329c
kernel-debug-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 08fcbba47a9ac07edf4c9a9edcb99001ccfb289a0bf86fcb97abb45ad0f63e2b
kernel-debug-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 371837cec269e779ce18b97b29eb02566653815f0cab0fd8578a5841ee099e54
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 91dc3c10db61377d78030a24b9960bdc548ffb8f11084091e6c42cb777485211
kernel-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d5aa66a50f5737afdcca84a37a520976a40cd5b0e203f5426caa871027991387
kernel-debuginfo-common-ppc64le-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f1a01dbb26b0c22a10981b7e1375f1b0ef80986cdbee229d5cfa951141d40d7e
kernel-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 7fa16efae2c6de19071a0204c3e3072661b671eb6b97dce84fdad0ee121c88bd
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: c29ae479b4651e69ae7ac42ac226ecbf74022b1167574d76fdcd0522deb3e8fe
kernel-modules-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 989af4d0b0839497cb6d8c3d7bca173bfb4171d98f3af1647e57cf84d1282337
kernel-modules-extra-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d7a375304e8ad5c8c13aa09812f1843e965ab78d4994cdfbf0ba0c2b071b7b37
kernel-tools-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d8e7b6007d21481c63a8c2b8942697321df9887ae4a5969144007ee9378a5fc3
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 4fecfc8ab1fceafc734aaca4a8807cc2212fd96c19437c2b08d4e56bd5d51b82
kernel-tools-libs-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 0b69f006a09f65dc720ed47bbdbf49c1f4c8170ffb0df3a70022bb663d5efd29
perf-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 46e5f6a77d46106833d8342d3549a1d7272b094bc4fbf1ac51e7379d6b4a5058
perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d7d6a4b821a088ff654137a0eec0ef24dd8c2f8b6c4b321080decc7bb0e668c6
python3-perf-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 1db1081b772734827b9dd30b9c7a0861302736796472ae109d2414d460919e8a
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f9e6b76c19c878e647e07b6fb9db2049da13a5e1d5e0d99a1e222e67292090c4
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.65.1.el8_4.src.rpm
SHA-256: 80ceb1085a8da2ac0671b8f89ac74d57a2d439e31628afe0d6037e28fd17cfc2
x86_64
bpftool-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: cf71e4556c8f34bcf8630e189b331b07489e94d27d1e38b33e518bbbefae7b6b
bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 34b1c81a23d81cde5d791a788b2cb3fa207e11bf858b1d6583c6c19aa768453d
kernel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 30d18bf99b7a32fd4e40e82a10bbee56f34433d6b53c8f2159cf1da456219aa0
kernel-abi-stablelists-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 0de124e38e5b71dd1e6a10f0b50e8c57119f5fcef28d78bd5a571f37dff0a481
kernel-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: b2b5b72a7d7d3ef0af98321011cd3a249ae9f9991e15b4ef6b4867b2bf78eb6c
kernel-cross-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: be1b8894ca84d86c643e80e67d5d8b7ad769518c62ce3bd5d6acd310b0b78ba6
kernel-debug-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 3d8513ebba1f3755586e8c9f9c7d1e95b99ac527a2fa9f113424cb4ff71e19db
kernel-debug-core-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: e854fefaaecf4958f3e76334024c5869a73b7b14297092ceda47fdf0c19df6a7
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a03bffcb2799bdfacb58f1accc5cfc157630124d4221f70c085e8c356ce2f858
kernel-debug-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 68fd3cbb17a950a9eb1eeabaff35dd8ce2b0e967b5b93ad7139639307d62b480
kernel-debug-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a42aa73cafe49cbf6f0abac0d423ddef23c9e48a085fdff355b74cd8e39b737c
kernel-debug-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8a5c040c05222748affd59e3e2ba29896cf43ff9acb3627146df7c5e9057572a
kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: ab465942626f17ea742ba529f899fbc3f7a167869a833509c75eb97777691361
kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 6f2a6bcdcdb42e5be26d982a493555499176cf6126da402d3ba5e980e069e423
kernel-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: fce408d47e73a9df9d2935c5770719cddc81f5af66bf26284ee50b2a579f6eac
kernel-doc-4.18.0-305.65.1.el8_4.noarch.rpm
SHA-256: 7048a6cfa8d0e83e53e6fd82a63c3e6d5e40536502127a57e219c07198d10142
kernel-headers-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 9358c272eb6e4bc290c31f7c5d73d6d35fb6ddd1bafb756909bcbe1c577b336b
kernel-modules-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 8aac8fb3c2a1a6fcb75b1fa4ca434e92e5763e78d5c3d4bd3d2345670f11d6bc
kernel-modules-extra-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: aeb5a029345491f2d2e035f73be03aad63991bbf28ab6a378e74272716d8b3a1
kernel-tools-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 7e5cf591fb8817cedb62f17cf0be6bd4146be90093e1065740322a684afcc60f
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 80cfbfc0544e71bad1c5c3f277546a4ec3fa44b54090c4cd2daa221ef058d282
kernel-tools-libs-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 088fa07dc2e2405b078830e2a6946e058f912469b56508344ad6b4a95877080f
perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 4b6046f91955802d035dca94967b94531f441d61f3b239669e727ceb861245d5
perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c2d48f6487ebd063b71231eb3ec8038ec9e54b780b5502e09312e3434abc19c3
python3-perf-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c1cf85a7c5e1b1ac3665643c39d9449bfa0911191f53052e7dde578d008f9b3c
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a90d408008cac6a532dc04d00392cafc2268146df062f936b9690d75aa4e709d
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 34b1c81a23d81cde5d791a788b2cb3fa207e11bf858b1d6583c6c19aa768453d
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a03bffcb2799bdfacb58f1accc5cfc157630124d4221f70c085e8c356ce2f858
kernel-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: ab465942626f17ea742ba529f899fbc3f7a167869a833509c75eb97777691361
kernel-debuginfo-common-x86_64-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 6f2a6bcdcdb42e5be26d982a493555499176cf6126da402d3ba5e980e069e423
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 80cfbfc0544e71bad1c5c3f277546a4ec3fa44b54090c4cd2daa221ef058d282
kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: 5a013ee5a9bd3e957010c2f2fb4514096107528597caa5fa3913f0e81e06198a
perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: c2d48f6487ebd063b71231eb3ec8038ec9e54b780b5502e09312e3434abc19c3
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.x86_64.rpm
SHA-256: a90d408008cac6a532dc04d00392cafc2268146df062f936b9690d75aa4e709d
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 6772405d65429f4f8667cd64aa1e0badc6ebbf8f55ca2c70bef5436bb86e0665
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: b1c81aceef67911f337d4ab417cdf614b1dfa4f434aef1d9f2ce0943c59e329c
kernel-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d5aa66a50f5737afdcca84a37a520976a40cd5b0e203f5426caa871027991387
kernel-debuginfo-common-ppc64le-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f1a01dbb26b0c22a10981b7e1375f1b0ef80986cdbee229d5cfa951141d40d7e
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: 4fecfc8ab1fceafc734aaca4a8807cc2212fd96c19437c2b08d4e56bd5d51b82
kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: c159528a0f4cdb5f659569df76c46867fd14177456bdc79b14a9909b9c57b8e0
perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: d7d6a4b821a088ff654137a0eec0ef24dd8c2f8b6c4b321080decc7bb0e668c6
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.ppc64le.rpm
SHA-256: f9e6b76c19c878e647e07b6fb9db2049da13a5e1d5e0d99a1e222e67292090c4
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: ea64fca34661cde7daeef9d99dd3774590eb8f8c53ee607e7f6c296d12cda8d2
kernel-debug-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: f92f74678cd177aa4b72728ac6a6cb3186d5339f908dd64a30b5a9239d43d7de
kernel-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 88a89648317429027bc2ca67d47b3ac614febe3b6945b40339db162a646b4607
kernel-debuginfo-common-aarch64-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 06d93822fb7f2f3c97c45ba6bdb4d35882a69f08cf76657e32a9ba509335a670
kernel-tools-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: 5732b568cbf2b7acc33aef5b197e46844f6e0b82b11504fc8ca6f6e33fe451ff
kernel-tools-libs-devel-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: b63f99a86ed72593cf8cbb1f19b89507598a261577ef16a999e3b28a01c3326c
perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: bbc0cd3c0fd85c619b671d71c5df45fc9352a1d5db9d6259282c94327cf05612
python3-perf-debuginfo-4.18.0-305.65.1.el8_4.aarch64.rpm
SHA-256: d8c9b749d18ab9d7a0a9dcb1d8e086c750c9e953993bcd8d43797bf9c0fbd456
Related news
Red Hat Security Advisory 2023-4022-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free, privilege escalation, and use-after-free vulnerabilities.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...
Red Hat Security Advisory 2022-8609-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.9.7 images. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 4.8.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go...
Logging Subsystem 5.5.4 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
Red Hat Security Advisory 2022-7216-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.51. Issues addressed include code execution and memory leak vulnerabilities.
Red Hat Security Advisory 2022-7337-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7211-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.39. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2022-7279-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete c...
Red Hat Security Advisory 2022-7171-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7137-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: cpu:...
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
Red Hat Security Advisory 2022-6983-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Red Hat Security Advisory 2022-6978-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Red Hat Security Advisory 2022-6875-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...
Red Hat Security Advisory 2022-6437-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2022-6437-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2022-6437-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.
Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2022-6252-02 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.784. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. Various other vulnerabilities were also discovered.
Ubuntu Security Notice 5582-1 - Arthur Mongodin discovered that the netfilter subsystem in the Linux kernel did not properly perform data validation. A local attacker could use this to escalate privileges in certain situations. Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code.
Gentoo Linux Security Advisory 202208-23 - Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 4.15.3 are affected.
Gentoo Linux Security Advisory 202208-23 - Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 4.15.3 are affected.
Gentoo Linux Security Advisory 202208-23 - Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). Versions less than 4.15.3 are affected.
Ubuntu Security Notice 5566-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5565-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5564-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that the netfilter subsystem of the Linux kernel did not prevent one nft object from referencing an nft set in another nft table, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21123: hw: cpu: Incomplete cleanup of multi-core shared buffers (aka SBDR) * CVE-2022-21125: hw: cpu: Incomplete cleanup of microarchitectural fill buffers (aka SBDS) * CVE-2022-21166: hw: cpu: Incomplete cleanup in specific special register write operations (aka DRPW)
Ubuntu Security Notice 5529-1 - It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service in the host OS.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.
Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5485-2 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5485-2 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5485-2 - It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak
The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak
Red Hat Security Advisory 2022-5392-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.
Red Hat Security Advisory 2022-5392-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.3.11 general availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurv...
Red Hat Advanced Cluster Management for Kubernetes 2.3.11 general availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurv...
Red Hat Security Advisory 2022-5201-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which apply security fixes and fix several bugs. Issues addressed include a traversal vulnerability.
Ubuntu Security Notice 5484-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5484-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. It was discovered that a race condition existed in the network scheduling subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-4956-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include privilege escalation and traversal vulnerabilities.
Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2021-43816: containerd: Unprivileged pod may bind mount any privileged regular file on disk * CVE-2021-43858: minio: user priv...
Red Hat Security Advisory 2022-4814-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include denial of service and memory exhaustion vulnerabilities.
Red Hat Security Advisory 2022-4814-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include denial of service and memory exhaustion vulnerabilities.
The Migration Toolkit for Containers (MTC) 1.6.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2021-39293: golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
Red Hat Security Advisory 2022-1988-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, denial of service, information leakage, integer overflow, memory leak, out of bounds read, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.