Headline
RHSA-2023:1130: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
- CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action “mirred”) a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
- CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
- kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
- kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134587)
- fix for “CoW after fork() issue” aka “vmsplice child -> parent attack” aka “GUP after fork bug” (BZ#2137546)
- Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137593)
- i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138206)
- RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140091)
- RHEL8.7: tcp sessions hanging after ibmvnic failover on Denali (BZ#2140958)
- RHEL8: Practically limit “Dummy wait” workaround to old Intel systems (BZ#2142171)
- RHEL:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for RHEL8.6 and need this patch in 8.6+ (BZ#2144584)
- i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149746)
- RHEL8.4 - boot: Add secure boot trailer (BZ#2151531)
- error 524 from seccomp(2) when trying to load filter (BZ#2152139)
- The “kernel BUG at mm/usercopy.c:103!” from BZ 2041529 is back on rhel-8.5 (BZ#2153231)
- kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154461)
- MSFT MANA NET Patch RHEL-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155438)
- GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155798)
- RHEL8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157923)
- ‘date’ command shows wrong time in nested KVM s390x guest (BZ#2158814)
- Kernel FIPS-140-3 requirements - part 3 - AES-XTS (BZ#2160173)
- ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160183)
- i40e/iavf: VF reset task fails “Never saw reset” with 5 second timeout per VF (BZ#2160461)
- Mellanox: backport “net/mlx5e: TC NIC mode, fix tc chains miss table” (BZ#2161630)
- Kernel panic observed during VxFS module unload (BZ#2162764)
- iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163259)
- In FIPS mode, the kernel should reject SHA-224, SHA-384, SHA-512-224, and SHA-512-256 as hashes for hash-based DRBGs, or provide an indicator after 2023-05-16 (BZ#2165133)
- panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167604)
- net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167641)
- Update intel_idle for Eaglestream/Sapphire Rapids support (BZ#2168357)
- GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168898)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2067482 - CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device.
- BZ - 2138818 - CVE-2022-41222 kernel: mm/mremap.c use-after-free vulnerability
- BZ - 2150272 - CVE-2022-4269 kernel: net: CPU soft lockup in TC mirred egress-to-ingress action
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
x86_64
bpftool-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e16a8926bf2dc14a06e6dc057494f27e3b4963433121f5b292f447c3f0cc79df
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 620758b6bb5675c6581a2a7fe23027e68406b7d40b322c28990c417b19ab1510
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1453b4208c77d64f6be9b8321daf2e20c29c8e919edd7fc86355485837662a18
kernel-cross-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2f258b90d2856b0f0d5345942b3e1874480a87091425082c2b82b842e8825a61
kernel-debug-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 13c2feaee2631056fdc490456e2296d64a06aa068004bcf1aaff62788ca30975
kernel-debug-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 9c223fbcabc5033465f623ca8b228a7dca185d8c5a7894357eb25eab7d312a58
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debug-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 607abb98aa44d822df13ce3edd19af679266802609d135426d9fd366fc0fb5b2
kernel-debug-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 6e7207b783cfaa09326378fb5bd575a6e17c8cbb800b717aa920a54ec934c47d
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7ae966a11f9029c03b1bdbd3df7dbfa301e9c06eb5d759612e18a19e90f5f77b
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 920695bab0cb9c243e6a22447b2a3045fb8d8e7907bd1ee12273fc11d292c350
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: d7c0668437099ff14360cc2402551f1386884cd3938325fa9f7deea69ed93bee
kernel-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2eb50be8f8576f716b23e86461336bf1bdcdf28ea1ac219b49dd5d08125c094f
kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: dedf275efef360ae896a2dfa6788312981d3b23ee80e2fb799b0dfccb4b9da42
kernel-tools-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 49be22b641a859f6108f9f8b571d5033b82ae3135116cc1662ff903174aae4bc
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7038f2ecdc50b785696de3ed8ac457c4de01e269a72264fe3e28423d7e0a9813
perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 50f3c2475ada23d24e4f3ac1f2b291469a5919b78957d61594765559e01753c8
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1d8f39bceac044ee69ddb4eea64f4ace86d52044ae787b3ecd106321ccfc8bd8
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
x86_64
bpftool-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e16a8926bf2dc14a06e6dc057494f27e3b4963433121f5b292f447c3f0cc79df
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 620758b6bb5675c6581a2a7fe23027e68406b7d40b322c28990c417b19ab1510
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1453b4208c77d64f6be9b8321daf2e20c29c8e919edd7fc86355485837662a18
kernel-cross-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2f258b90d2856b0f0d5345942b3e1874480a87091425082c2b82b842e8825a61
kernel-debug-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 13c2feaee2631056fdc490456e2296d64a06aa068004bcf1aaff62788ca30975
kernel-debug-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 9c223fbcabc5033465f623ca8b228a7dca185d8c5a7894357eb25eab7d312a58
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debug-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 607abb98aa44d822df13ce3edd19af679266802609d135426d9fd366fc0fb5b2
kernel-debug-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 6e7207b783cfaa09326378fb5bd575a6e17c8cbb800b717aa920a54ec934c47d
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7ae966a11f9029c03b1bdbd3df7dbfa301e9c06eb5d759612e18a19e90f5f77b
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 920695bab0cb9c243e6a22447b2a3045fb8d8e7907bd1ee12273fc11d292c350
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: d7c0668437099ff14360cc2402551f1386884cd3938325fa9f7deea69ed93bee
kernel-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2eb50be8f8576f716b23e86461336bf1bdcdf28ea1ac219b49dd5d08125c094f
kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: dedf275efef360ae896a2dfa6788312981d3b23ee80e2fb799b0dfccb4b9da42
kernel-tools-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 49be22b641a859f6108f9f8b571d5033b82ae3135116cc1662ff903174aae4bc
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7038f2ecdc50b785696de3ed8ac457c4de01e269a72264fe3e28423d7e0a9813
perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 50f3c2475ada23d24e4f3ac1f2b291469a5919b78957d61594765559e01753c8
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1d8f39bceac044ee69ddb4eea64f4ace86d52044ae787b3ecd106321ccfc8bd8
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
s390x
bpftool-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 947e0fc88c394678c5a4a774925f7945c20debf037f3799280d5330b217aabe6
bpftool-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 9113eb7b7ced2e26a912329561d4deec776593cd73b0fb99e3003f49e9a87c6f
kernel-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 1464c36fe73c2eced85ce0e3e45220ef6176310818e9d7d741f257d899422e6c
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 4a3af6036c0ed9dd87e70f05e1937f7109ce6fce048ec0eedc9dd9aaa2536c31
kernel-cross-headers-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 783b2328773238ea284227f428016ebe54e258a652eae26ba3847c270892434b
kernel-debug-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 3258c6f33cbb354f2cfb8b09ac20191d53d6710cb02e36d90c495d8873cd8f77
kernel-debug-core-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: fa63121323003f0f3a1967a654aad9cafc28f1dfb1322d3da6f47e05e2ca72f3
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: e98e61d89781f50a1330431cace8e1ba1cdbb8277d632d643f86b944fb1cb223
kernel-debug-devel-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 26467429c5b14527e6d60951dde519d739e37cb738da4c4bf30539eef0cce28e
kernel-debug-modules-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: afdf5d96847b4f68b31de0963a4402f8309c9c76ee45ff78437ee0b8a1c71b7d
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 9be999ed390eddd3d2fb46994e2c58f9f6092bf4b19443521afba5eba68a3125
kernel-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 798970d8023f7dc99570ed954812bb4f63efe56f7feaf883428ab8770ffe2232
kernel-debuginfo-common-s390x-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 092f54bdf76387590678cfd2173a7b0603cbdfd5220014a19968a6830af9be1a
kernel-devel-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: a55168286b5fcd93d52ac6088c910ac7c1b4be01ed0ac86b353887a7c5bf1091
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 3497120838f30a7d6254acc62d1585c03b2ae3b6e383d07bf6773bf98e7ed1dd
kernel-modules-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: ebb6367559ef0b904e431ee905a559ea25e46a9de7110cb3531b3e1fa2c48d58
kernel-modules-extra-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 0deb2d470d4ecdd1d86dbb25aaf4fd35d698964392a5178236b89c4628812124
kernel-tools-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 6a37609f8319aea6fcff863280e45a730b471ec06d9fcdc0a0daab0aab6d0957
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: f3c52133fe0b8df18d29c98877988b28ba21cbd34ac55ae353cc0011116a8939
kernel-zfcpdump-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 5ac2b6607709866afa392279238aeb21b19d13f8d60d9cd0485ced97b943e71e
kernel-zfcpdump-core-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 52ba435c3cbc2718b054fd9434c3569e56426710e6099be87a57c6c1bcc129af
kernel-zfcpdump-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 742a444aae09847c0e8e426d497d0d7a3a06f9b9272fffd8eb6850b9c1c48e5d
kernel-zfcpdump-devel-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 301eb56dfeefc9bd392638dc1bfe81b8b8024e4b71548c120d58bb2371177306
kernel-zfcpdump-modules-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: e01cf2036199ba8bf2cd91365d0682ee9bf62ddcd5e2a017b8d54f6c19101e9a
kernel-zfcpdump-modules-extra-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 30da6dfdb57e82f172281ecd453bb3e7905fb2a9acd070350f35e545f94bdfbe
perf-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: d847e49750a1ef2f5da01a68893cf56749013d1cbfad30d348363533c75acc26
perf-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 846e8089d19129357f0bc3ff31e4ac4b0c5e91aa8e0f4fdde274d6304f2a850e
python3-perf-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: ee48707b8d08e39776c3c4d19f255614e6e79b6d57fdee8fb1b76d011bf3c46b
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.s390x.rpm
SHA-256: 49aa9dbdf7bb9f8f6e189675aa2cdb67775f0524b3765ce6c1f5ac5d53edbf48
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
ppc64le
bpftool-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: aaeea78de29d5d0c831c62013483984fe35f881c6292a9bf5f599c453fcf59ce
bpftool-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 14115861d50da323fa555b220af145508490e3a88648c32a25708dd6ecabab26
kernel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 48744220885281652b7556dc278ee3184e46215683ac3c81a867290c89e1f787
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 0647ca826660906294badd8a845559a913c71314cb6d44b802d5f322d5b49ef3
kernel-cross-headers-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: d72fcbbe6ff4eaacd2efed272e8fe9083c4f5532396cd359649e860dbebebf6a
kernel-debug-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 4ce4ed166467c77ced11bcd6371122fb08d64ca59d8c0125f62de074d43d5c7c
kernel-debug-core-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 8c9b5ce42993b9d4f3ba8c89bfb8d16ffdc8b06333ed053a15eefa089b0487ed
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: f5c569897e826e4f327471fbaabbe58a75e54bf6f98ba3c6194ed985ca490631
kernel-debug-devel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: cc4ffc0e2106a262eafa6cab0cb9a3ccb90f1542328ddfb6611c0d3bec1e63a7
kernel-debug-modules-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: a77a07108829dabcd005b9f994d561cdfe96d4c38d85c320e3e05e2317cd85d5
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 122fd6b19737c3a5b1988137e3c92fe126427bb5a4be022433618826cba855c5
kernel-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 463dde40a0db038cd819cb4db484d959b893bfa1bd09ff6459a842525eb99a4c
kernel-debuginfo-common-ppc64le-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 60b834ef89a72284ca3c042e9c2161123759a381345b3be885ec8684f023bc14
kernel-devel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: c46bb23d525077daaa87154fcac6fe2abdf79125bcd9f4245e0ade7277ef0927
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: db886c1c14c60367c9d2bbddc0e2156c03717a946d00a1d3c6f03bc0ceaf3734
kernel-modules-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: ca8dea6ec915b4da01eebaea3680c6bbf12b1a7912b955f4e45b5e8c8ea5a808
kernel-modules-extra-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 57fc2dc96402d08a549e9d2d465b9b8b81067140a022db50c19085db2ce899db
kernel-tools-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 67cc65554eaf0a547101cf3cbf96cdec6b81c4fc1171f02c8579894ba8351e8c
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: c2fa14b241d91c8d585ba8b98bea35fb60356d3034c2a69b5244048cac47ce0d
kernel-tools-libs-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 5ba61f11625e9e68c04493bccc889f27d8e051ee83b7503ed299ef616e8e20a6
perf-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 3ee238d661d2cc0f96346a1d71542e9a790a3eaf2180f53086239d7f28e5d996
perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 36eebbe369362124726725c7469687ab7fd0859aa10a1d7497e742719af14269
python3-perf-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 9718d43d5b1b28974746556b859a86d2c2ba60cb1666b7f2b058029f875167e9
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: bcc69fda55bbc72e5708972065fac975edb7d31afab86a33141b4dbf00872602
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 920695bab0cb9c243e6a22447b2a3045fb8d8e7907bd1ee12273fc11d292c350
kernel-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: d7c0668437099ff14360cc2402551f1386884cd3938325fa9f7deea69ed93bee
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 50f3c2475ada23d24e4f3ac1f2b291469a5919b78957d61594765559e01753c8
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
x86_64
bpftool-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e16a8926bf2dc14a06e6dc057494f27e3b4963433121f5b292f447c3f0cc79df
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 620758b6bb5675c6581a2a7fe23027e68406b7d40b322c28990c417b19ab1510
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1453b4208c77d64f6be9b8321daf2e20c29c8e919edd7fc86355485837662a18
kernel-cross-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2f258b90d2856b0f0d5345942b3e1874480a87091425082c2b82b842e8825a61
kernel-debug-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 13c2feaee2631056fdc490456e2296d64a06aa068004bcf1aaff62788ca30975
kernel-debug-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 9c223fbcabc5033465f623ca8b228a7dca185d8c5a7894357eb25eab7d312a58
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debug-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 607abb98aa44d822df13ce3edd19af679266802609d135426d9fd366fc0fb5b2
kernel-debug-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 6e7207b783cfaa09326378fb5bd575a6e17c8cbb800b717aa920a54ec934c47d
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7ae966a11f9029c03b1bdbd3df7dbfa301e9c06eb5d759612e18a19e90f5f77b
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 920695bab0cb9c243e6a22447b2a3045fb8d8e7907bd1ee12273fc11d292c350
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: d7c0668437099ff14360cc2402551f1386884cd3938325fa9f7deea69ed93bee
kernel-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2eb50be8f8576f716b23e86461336bf1bdcdf28ea1ac219b49dd5d08125c094f
kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: dedf275efef360ae896a2dfa6788312981d3b23ee80e2fb799b0dfccb4b9da42
kernel-tools-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 49be22b641a859f6108f9f8b571d5033b82ae3135116cc1662ff903174aae4bc
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7038f2ecdc50b785696de3ed8ac457c4de01e269a72264fe3e28423d7e0a9813
perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 50f3c2475ada23d24e4f3ac1f2b291469a5919b78957d61594765559e01753c8
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1d8f39bceac044ee69ddb4eea64f4ace86d52044ae787b3ecd106321ccfc8bd8
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
aarch64
bpftool-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 14eeceedf334fa933ff728820d7d7f79647b79a2186785721bd3f50b45ae957b
bpftool-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 022edb734071ed7d2cfbfb134f766a938eff893c7680eb25c8c061cede4927da
kernel-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 502bcc0faa4da61a381803ded2d3516c28da9f63fa912197f387a56af37d23a1
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 01dae1bbb6a91efd4ac4aeffd78269bdd024f07d49208b7563cdc5e9f0837f8d
kernel-cross-headers-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: c116bd7390bdf425c614b7e19edbf0792f088a0943f71ec958db2d2d65533685
kernel-debug-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 83006bba2cb50b741dd943b80fcad6041fa38cdf4982a97d42eb52e3cbc69ac8
kernel-debug-core-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: d95d842f3c7c1c9493e136082d0a35ec08b1487517b4ba1d63e571ed037fe099
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 120185fe0f6fe2c121acac74065ca5b2b0ff68a8143c3e5b594576d80f95a2e2
kernel-debug-devel-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 7b192462ad673a3d6d8036199010f245968d4e782f713f3860fac0dab47c9d4f
kernel-debug-modules-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 85b11622f2439bf01d8dd12164c33821699b49ef49d9c531b99c027ff2f9e57b
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 958685551306d6c9b72c30c9018817c319ac8d7baf4b1d3e6bcc1f7c697be596
kernel-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: f937b31c6235cffdf8d583a7500af0b795338e7976a03191c569b40ac30d7731
kernel-debuginfo-common-aarch64-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 37c9df4125ad8a3a9561882a114d2b8ecf598bd1b78879fbc156992f912387e4
kernel-devel-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 1b5abc6ee1918542474ed9ce191d447c2b494b2c7b4cfa51160f4cc9c122c2b1
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 5303cda82df58f6ce5cfe4adbdeda4146e75838b610ce28d8160d7e73d01acdf
kernel-modules-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 1431fbf1fb80ed6a43563244bb0edc9de83c05d5a488beea3f7f6384d905ff00
kernel-modules-extra-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 28264db909212261857c52d0801d67ec3fcf113e090f1d9ae627a0dea0e7ce7d
kernel-tools-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 01b08a7365a837657edc89ee2f184aaed8f218d0e996501eeed6d487541c9030
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: a674c1ae91ead10a6a0cb6a0bb0b34dbb83589ab391005ed9f11a7d8e244ede2
kernel-tools-libs-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 428495771bbaba25eb3ae058115fc3c9e32bac484515603157fbaec999e18b63
perf-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 54750178fd02f00ec5378f9030aeb42be446ffca41d5d4e3b929f840b1ad44f2
perf-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: f83b25ca2782a85a8a970fe60ebc79583fc005b3cedffa3a504cf2b9b8ed83c9
python3-perf-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: e2a0bab2c990f7edf0157afab8e1626026e748b39be7451de7f0492d398469d2
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 2c7968c1282f9cdfd8a134a4512caaf3ad629b7b2961e52375979c07d524cac3
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
ppc64le
bpftool-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: aaeea78de29d5d0c831c62013483984fe35f881c6292a9bf5f599c453fcf59ce
bpftool-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 14115861d50da323fa555b220af145508490e3a88648c32a25708dd6ecabab26
kernel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 48744220885281652b7556dc278ee3184e46215683ac3c81a867290c89e1f787
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 0647ca826660906294badd8a845559a913c71314cb6d44b802d5f322d5b49ef3
kernel-cross-headers-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: d72fcbbe6ff4eaacd2efed272e8fe9083c4f5532396cd359649e860dbebebf6a
kernel-debug-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 4ce4ed166467c77ced11bcd6371122fb08d64ca59d8c0125f62de074d43d5c7c
kernel-debug-core-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 8c9b5ce42993b9d4f3ba8c89bfb8d16ffdc8b06333ed053a15eefa089b0487ed
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: f5c569897e826e4f327471fbaabbe58a75e54bf6f98ba3c6194ed985ca490631
kernel-debug-devel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: cc4ffc0e2106a262eafa6cab0cb9a3ccb90f1542328ddfb6611c0d3bec1e63a7
kernel-debug-modules-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: a77a07108829dabcd005b9f994d561cdfe96d4c38d85c320e3e05e2317cd85d5
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 122fd6b19737c3a5b1988137e3c92fe126427bb5a4be022433618826cba855c5
kernel-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 463dde40a0db038cd819cb4db484d959b893bfa1bd09ff6459a842525eb99a4c
kernel-debuginfo-common-ppc64le-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 60b834ef89a72284ca3c042e9c2161123759a381345b3be885ec8684f023bc14
kernel-devel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: c46bb23d525077daaa87154fcac6fe2abdf79125bcd9f4245e0ade7277ef0927
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: db886c1c14c60367c9d2bbddc0e2156c03717a946d00a1d3c6f03bc0ceaf3734
kernel-modules-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: ca8dea6ec915b4da01eebaea3680c6bbf12b1a7912b955f4e45b5e8c8ea5a808
kernel-modules-extra-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 57fc2dc96402d08a549e9d2d465b9b8b81067140a022db50c19085db2ce899db
kernel-tools-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 67cc65554eaf0a547101cf3cbf96cdec6b81c4fc1171f02c8579894ba8351e8c
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: c2fa14b241d91c8d585ba8b98bea35fb60356d3034c2a69b5244048cac47ce0d
kernel-tools-libs-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 5ba61f11625e9e68c04493bccc889f27d8e051ee83b7503ed299ef616e8e20a6
perf-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 3ee238d661d2cc0f96346a1d71542e9a790a3eaf2180f53086239d7f28e5d996
perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 36eebbe369362124726725c7469687ab7fd0859aa10a1d7497e742719af14269
python3-perf-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 9718d43d5b1b28974746556b859a86d2c2ba60cb1666b7f2b058029f875167e9
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: bcc69fda55bbc72e5708972065fac975edb7d31afab86a33141b4dbf00872602
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.46.1.el8_6.src.rpm
SHA-256: 4785b76a82766c3dd8b07c163655eb1f2fc80fc3b956909669695ffd2bff03f3
x86_64
bpftool-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e16a8926bf2dc14a06e6dc057494f27e3b4963433121f5b292f447c3f0cc79df
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 620758b6bb5675c6581a2a7fe23027e68406b7d40b322c28990c417b19ab1510
kernel-abi-stablelists-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: 480bf153973f017ca1ea780a1634437b5d0eae564dcfe2d841519af9aa55b468
kernel-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1453b4208c77d64f6be9b8321daf2e20c29c8e919edd7fc86355485837662a18
kernel-cross-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2f258b90d2856b0f0d5345942b3e1874480a87091425082c2b82b842e8825a61
kernel-debug-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 13c2feaee2631056fdc490456e2296d64a06aa068004bcf1aaff62788ca30975
kernel-debug-core-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 9c223fbcabc5033465f623ca8b228a7dca185d8c5a7894357eb25eab7d312a58
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debug-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 607abb98aa44d822df13ce3edd19af679266802609d135426d9fd366fc0fb5b2
kernel-debug-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 6e7207b783cfaa09326378fb5bd575a6e17c8cbb800b717aa920a54ec934c47d
kernel-debug-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7ae966a11f9029c03b1bdbd3df7dbfa301e9c06eb5d759612e18a19e90f5f77b
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 920695bab0cb9c243e6a22447b2a3045fb8d8e7907bd1ee12273fc11d292c350
kernel-doc-4.18.0-372.46.1.el8_6.noarch.rpm
SHA-256: bfbdae935cd939479e2172ed43f1e3b249a4217c27fb1cf91891670a7723e454
kernel-headers-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: d7c0668437099ff14360cc2402551f1386884cd3938325fa9f7deea69ed93bee
kernel-modules-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 2eb50be8f8576f716b23e86461336bf1bdcdf28ea1ac219b49dd5d08125c094f
kernel-modules-extra-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: dedf275efef360ae896a2dfa6788312981d3b23ee80e2fb799b0dfccb4b9da42
kernel-tools-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 49be22b641a859f6108f9f8b571d5033b82ae3135116cc1662ff903174aae4bc
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
kernel-tools-libs-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 7038f2ecdc50b785696de3ed8ac457c4de01e269a72264fe3e28423d7e0a9813
perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 50f3c2475ada23d24e4f3ac1f2b291469a5919b78957d61594765559e01753c8
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 1d8f39bceac044ee69ddb4eea64f4ace86d52044ae787b3ecd106321ccfc8bd8
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 4e41fbe452e2af5249903009363507ec4d88f9ed2f81ac1e62240564420172cc
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 72a354fd254e7ac2dc877d6772ea0d7497b2107f2438efd347875d457219ebcb
kernel-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: b4440b6fb9673a881dac20af10496c5d055b0a4b4e8dc7d762c0f35a5c4a3ff0
kernel-debuginfo-common-x86_64-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: ced7bc37185b6f92223f70ca77b6c8d0360b105f2be6c30cf16a33044cd61d73
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: c34d7feefb2640365af81996950c6a9b6fe401e4c20ca661c3c8bc58dab55d5e
kernel-tools-libs-devel-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: cabdb40447d95be9550eb7743de9b5abea75b95c1b11e919425a01a920f5a0a3
perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: e525b6417c1ebf91fe73e5be4fd254ca5382c07004e204d0522969dc02acf39d
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.x86_64.rpm
SHA-256: 3a6ce02fce65a085596e854bba1d16f4f52962bc9ae570574566acc2ad978a89
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 14115861d50da323fa555b220af145508490e3a88648c32a25708dd6ecabab26
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: f5c569897e826e4f327471fbaabbe58a75e54bf6f98ba3c6194ed985ca490631
kernel-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 463dde40a0db038cd819cb4db484d959b893bfa1bd09ff6459a842525eb99a4c
kernel-debuginfo-common-ppc64le-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 60b834ef89a72284ca3c042e9c2161123759a381345b3be885ec8684f023bc14
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: c2fa14b241d91c8d585ba8b98bea35fb60356d3034c2a69b5244048cac47ce0d
kernel-tools-libs-devel-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 569910509a3a06d4e0492564f9720f73a07ade116a1b4d53a239f7ed66332c7a
perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: 36eebbe369362124726725c7469687ab7fd0859aa10a1d7497e742719af14269
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.ppc64le.rpm
SHA-256: bcc69fda55bbc72e5708972065fac975edb7d31afab86a33141b4dbf00872602
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 022edb734071ed7d2cfbfb134f766a938eff893c7680eb25c8c061cede4927da
kernel-debug-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 120185fe0f6fe2c121acac74065ca5b2b0ff68a8143c3e5b594576d80f95a2e2
kernel-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: f937b31c6235cffdf8d583a7500af0b795338e7976a03191c569b40ac30d7731
kernel-debuginfo-common-aarch64-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 37c9df4125ad8a3a9561882a114d2b8ecf598bd1b78879fbc156992f912387e4
kernel-tools-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: a674c1ae91ead10a6a0cb6a0bb0b34dbb83589ab391005ed9f11a7d8e244ede2
kernel-tools-libs-devel-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: fa7e38ec02804f09438592839d375b7f0def61a5a03a99b8f71fd0451abecbbc
perf-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: f83b25ca2782a85a8a970fe60ebc79583fc005b3cedffa3a504cf2b9b8ed83c9
python3-perf-debuginfo-4.18.0-372.46.1.el8_6.aarch64.rpm
SHA-256: 2c7968c1282f9cdfd8a134a4512caaf3ad629b7b2961e52375979c07d524cac3
Related news
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Ubuntu Security Notice 6337-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6314-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
Ubuntu Security Notice 6284-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6187-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or poten...
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user to c...
Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3841: A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauth...
Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux So...
Red Hat Security Advisory 2023-1584-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Red Hat Security Advisory 2023-1393-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.55.
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
Red Hat Security Advisory 2023-1470-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a double free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Red Hat Security Advisory 2023-1221-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1203-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space account...
Red Hat Security Advisory 2023-0932-01 - Update information for Logging Subsystem 5.6.3 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
Logging Subsystem 5.4.12 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to alloc...
Red Hat Security Advisory 2023-1130-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Logging Subsystem 5.6.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...
Red Hat Security Advisory 2023-0839-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-0832-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, null pointer, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in ho...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code in how a race condition happens between rmap walk and mremap. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-43945: A buffer overflow flaw was found in the Linux kernel nfsd (...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-41222: A use-after-free flaw was found in the Linux kernel’s mm/mremap...
It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Sonke Huster discovered that a use-after-free vulnerability existed in the WiFi driver stack in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Red Hat Security Advisory 2023-0404-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0396-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0392-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
Ubuntu Security Notice 5728-3 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5728-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5728-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.