Headline
RHSA-2022:5998: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
Synopsis
Moderate: kernel security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- kernel lockup/list corruption in semaphore code (BZ#2095494)
- Need some changes in RHEL8.x kernels. (BZ#2096933)
- backport “bnxt: don’t lock the tx queue from napi poll” (BZ#2100421)
- net: openvswitch: fix parsing of nw_proto for IPv6 fragments (BZ#2106705)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64
Fixes
- BZ - 2066819 - CVE-2022-1353 Kernel: A kernel-info-leak issue in pfkey_register
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
x86_64
bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5
bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4
kernel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423
kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751
kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04
kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b
kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38
kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4
kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e
kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea
kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b
kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c
kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d
kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804
kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553
perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263
perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092
python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
x86_64
bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5
bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4
kernel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423
kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751
kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04
kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b
kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38
kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4
kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e
kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea
kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b
kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c
kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d
kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804
kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553
perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263
perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092
python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
s390x
bpftool-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 1065f6a78c5ca0bba8880fc0f5cf0403ee0245ac83c86f0b3176d0b1761ebf04
bpftool-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 4c2c9680f6a4e05def5e7358cec669e79bf94a9f095037e003fffbcb342ef691
kernel-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 04e446c14da56da9b08410465da3aad8f32b2f64268a8a2a6b96cfef20c022af
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: a31262e05f98ffe6181f7dbc33748a6cf6fe3955f7d7cf35f10799ad2abe760a
kernel-cross-headers-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 1df4391cfb24ad380be91509bcb2e0ca0e5a7355599b60b16e0732af7cf96c6a
kernel-debug-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 2e2f8544111f49f727a758b4ff3fe0221283200f96661eea2510fb295933e654
kernel-debug-core-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 99e72f3ae51861d14129d4ac8ebebbe203e569e3259b03ed033aca1f8f849d88
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 17d1df860b885e2356ef09fc90401e53d34f9e28e1c92bd3a1eaa9c78f93e306
kernel-debug-devel-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 11ff319f5692afd463dd8661777fe7abc366c0f918d155ca7f558db8f3304b3e
kernel-debug-modules-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: cd6c95b0788bdb0766ce940f977eb332db386b132204206676829634791a949f
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 522bbd2bbe46c64a7c7903dbc1981f7221c1df4bcf9be0e6f11d3e4497d89afc
kernel-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 64523c9b92621ae4728117177e818001e30377298df5a4dd9d89a173e58ea89d
kernel-debuginfo-common-s390x-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: c86de954c270fcc5106831f492515dddf9265b68a34a9d730c4f2581a29a549e
kernel-devel-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: bc4b5ee3af75db6db439492b399143565bfbba7b7e1ca941a5e05016155e412f
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: fa987e30923715b04616b58a0281f34a092e2dc9edf2b804f32fd5b359e4b9b3
kernel-modules-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: ad1af16537715f8bd1caa21b61cc5437d36a107f9a46ef408953bfd9cc4dd136
kernel-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 04233683818b90bd5307ca7c3668c795f2663a0829842d1fa6e8acf771c4fb4f
kernel-tools-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: d4501ec28c2b486cba5eaab4babbdbc492bb90fd0ab179d182982c83d9450e95
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: e35dbbfc649a3642e33a582f211273f04d88f33033c3329291f8335f44b5c21f
kernel-zfcpdump-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 054891b6baafed0c104f2f33d1f4967c8ba48ff29a332c7c688f3ea0c655adef
kernel-zfcpdump-core-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 72db0e2e6764cd3aa31494d0784cb7da77db9177c4b273d144f5d94063090231
kernel-zfcpdump-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 05539f8e3ac1f1346f53b7aa72b7d3aad038ae0b5710e190d1203ffe2b177e2f
kernel-zfcpdump-devel-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 3b0d2cd2873e8540af4bb1e444f6aa96675ef66d17ba4582713f1d41aa166678
kernel-zfcpdump-modules-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: b252a9c0d1852e80c5704a3393bfa41bd685259109e027e380ef88f277dd5b04
kernel-zfcpdump-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: f45791b7329d5a987bcff4efb9229b328483e3e1646ba424c1faa6ca2fee5b31
perf-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 9772b73ac789efbd87ef8a85456725f8d03570b0eca83d9cb355bdc89c1f6483
perf-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 0b1b4ec59676a886ffcabcea6e81d3c50c253af83f9990c9acb1281c46fd151d
python3-perf-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 1e10014ab316487c9f838973cf923e2a6f783caf1600b867c72d98cb02c73229
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm
SHA-256: 3798b6e7838cc9d6c82c0094e86b3bde3bdaff79a1103d0a9cb3188e1898b990
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
ppc64le
bpftool-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: a464288ae44f154b7dd60399ddb2b60b9b8002b9eaad6a353c7906e5ebaaecb4
bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e
kernel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: d6dcd4557d219f2064edeafcf1d4fd536f0b06c4925294bf84ef6d2595bae092
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: f961232f68c19fa32d652adef93663ac6b35fe1b5ea27dcd737f0aeb7e2c6305
kernel-cross-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: f44be608724e506994a91b6ab855848b239651825de925271a9fac3ccd93f6ef
kernel-debug-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: b6e519169fe32f83add2b81a8094b412e723f0e2ea68044f8d904b866eda61da
kernel-debug-core-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 15948e4fc819a739a3321a3ed28dd3f40a837dc903045ad8d6cde775bea9d565
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce
kernel-debug-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: be9c0a6ff8d497c45218231e761707c5bd898053b005318887fdaee7c4c76399
kernel-debug-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: ba20e7e5d28b107d669ac9f5a9b7756fea3b552fdd20109927161f8ad035fea7
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: d808867b99532665b86b88e246e804bb9195616b3fd37576502b9efd3eebd381
kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6
kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7
kernel-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 42a54e99e106de2d1a08bac60b1311cbdb1fd060b7436ef052ded4f005b91848
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 76c3ca6534be5038cef6d0343b11eaafa36d04ae958ed4c4fedc9bf821416b8f
kernel-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 5a8e101df3b9327cd7c1835df15e42faf7ce0f6f28bb25c1c68e192f1ca1af88
kernel-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 21fc66f13261cd4996c374c2cf57277f183b2cc4cffcf1bc6efbca16d67fd6e8
kernel-tools-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: b6ff0063996e615da739508133152be12353c8b92d4c86e9b7d2b5f2a293ffdb
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621
kernel-tools-libs-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 22ec8fa5901b090a34ef2e1eac587ed6f8689004bcfe676173486d762a32a80e
perf-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: c11307710a33e6443aab3985da1a2d202e1614aaa6def80ddd5cab938d4632dd
perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4
python3-perf-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: e58bb7417ec1091af37443b9e37d7f6e722f41e3e5f91ce076b99093bc7535c0
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
x86_64
bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5
bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4
kernel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423
kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751
kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04
kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b
kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38
kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4
kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e
kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea
kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b
kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c
kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d
kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804
kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553
perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263
perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092
python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
aarch64
bpftool-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 88a0716c19d53c91b8d2d96447c596c1b6f384fb517c7e65f1ef3286e122ee5d
bpftool-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 07cc17edbddfd2877bce4346e6438002c9e70b3a6c833ae00123a827ca025582
kernel-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: c60c4bcad15de6de2e9a895d6324896cd99c47abe755d20b05ecbc70749aabe0
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 4fa84f8c23146369450db1be59f07f858c70dfd5a9c1b48aa57619c63d2521aa
kernel-cross-headers-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 79d92fb98410d595328447a8790a034c1cc94d477c55a0110b19cf1078fc479b
kernel-debug-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: bed7bb6ea19e7631b9b2bcba510df091289b4a5fb4c261c32b1d03f6860ae68b
kernel-debug-core-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 1bb3bb8f2dd04af946ee28f07c759d4d4eb0e65fc72bacb1cdf1c12f1a956acf
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 15e0a0c2b41d1192584d6c445cccab9ed85c32a3d24f322243baab79cd68c635
kernel-debug-devel-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: af5993e12dfa1c14f5b18df89436927a813bcd0b02459052ddca6cb47f7e74e7
kernel-debug-modules-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 35b24460e6aaf80d026da53e048b5a6a5da287bb3bc69ffa33bce51eb8c75b9d
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 301f786b48e9c7272643e562afa56597e1c25ae9dd2a2918914a94f0e3aaa9f1
kernel-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 48194e079344912e52d757cc4567f597f8f14db8742d29ed93c6c9d8757d8aaa
kernel-debuginfo-common-aarch64-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 682a7c88ba8cc50e660c3742992dc67a35bb068d48f0bce6f5aebe813dea4e58
kernel-devel-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: dafeb46ef3ae5706c5d5238bb9cdf830ada113f34edc0368fa49cfd6f97be7de
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 214e589d9a5cb1d92b05bc6dfa408bdff33f02e450bce427d6a41f93a2d5d234
kernel-modules-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: d47bf2ff079ea96b2bb341de4879c777d40579b20e7d172e94d1015592bf2c7b
kernel-modules-extra-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 0ed2dba7045d4d13d5afe557226bebfc4fabca21259d5c81d214afa6ef17ec2b
kernel-tools-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 85c53587f0e3c7eafae7cea13609c694dd0c5c8aa6801229c047a4013b014993
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 2d62a58f489483cdc2ccc0727016037a590b05919032bac18d592a1ef9e01c8f
kernel-tools-libs-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 17e94ca9e76d2f5721a26a006149b952f7b46b632c5ac1ef0bd8819a5c616b84
perf-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 7c165f0c094e55c449c7386f272644349795fc4ad328f6d5261cec1abd6b3a32
perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 5c68ccc119914e37141229d8716c2e1c0ac309322f7d8b9503773f02a39c6aef
python3-perf-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: cf96f08934cc4df8f9aa8b6b8930115404224525b651a9fc482fc7f8e7818e37
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 043b350b5cee6556bdda6c6236cf7a384aea94f6f5ea65a6b1b453f51535679c
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
ppc64le
bpftool-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: a464288ae44f154b7dd60399ddb2b60b9b8002b9eaad6a353c7906e5ebaaecb4
bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e
kernel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: d6dcd4557d219f2064edeafcf1d4fd536f0b06c4925294bf84ef6d2595bae092
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: f961232f68c19fa32d652adef93663ac6b35fe1b5ea27dcd737f0aeb7e2c6305
kernel-cross-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: f44be608724e506994a91b6ab855848b239651825de925271a9fac3ccd93f6ef
kernel-debug-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: b6e519169fe32f83add2b81a8094b412e723f0e2ea68044f8d904b866eda61da
kernel-debug-core-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 15948e4fc819a739a3321a3ed28dd3f40a837dc903045ad8d6cde775bea9d565
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce
kernel-debug-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: be9c0a6ff8d497c45218231e761707c5bd898053b005318887fdaee7c4c76399
kernel-debug-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: ba20e7e5d28b107d669ac9f5a9b7756fea3b552fdd20109927161f8ad035fea7
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: d808867b99532665b86b88e246e804bb9195616b3fd37576502b9efd3eebd381
kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6
kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7
kernel-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 42a54e99e106de2d1a08bac60b1311cbdb1fd060b7436ef052ded4f005b91848
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 76c3ca6534be5038cef6d0343b11eaafa36d04ae958ed4c4fedc9bf821416b8f
kernel-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 5a8e101df3b9327cd7c1835df15e42faf7ce0f6f28bb25c1c68e192f1ca1af88
kernel-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 21fc66f13261cd4996c374c2cf57277f183b2cc4cffcf1bc6efbca16d67fd6e8
kernel-tools-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: b6ff0063996e615da739508133152be12353c8b92d4c86e9b7d2b5f2a293ffdb
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621
kernel-tools-libs-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 22ec8fa5901b090a34ef2e1eac587ed6f8689004bcfe676173486d762a32a80e
perf-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: c11307710a33e6443aab3985da1a2d202e1614aaa6def80ddd5cab938d4632dd
perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4
python3-perf-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: e58bb7417ec1091af37443b9e37d7f6e722f41e3e5f91ce076b99093bc7535c0
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
kernel-4.18.0-193.90.1.el8_2.src.rpm
SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d
x86_64
bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5
bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4
kernel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d
kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee
kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423
kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751
kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04
kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b
kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38
kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96
kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4
kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e
kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea
kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01
kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm
SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e
kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b
kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c
kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d
kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804
kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553
perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263
perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092
python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2
SRPM
x86_64
bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b
kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e
kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804
kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 67bf4233161a0f728b8f6f138e8e6b12092c9dc6fd82335743e75748d42c58c5
perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm
SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2
SRPM
ppc64le
bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce
kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6
kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621
kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 5c96d3b6cc82d9b41f361857fca75ad018d99cdf0c8a457b424c19853ac90644
perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm
SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2
SRPM
aarch64
bpftool-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 07cc17edbddfd2877bce4346e6438002c9e70b3a6c833ae00123a827ca025582
kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 15e0a0c2b41d1192584d6c445cccab9ed85c32a3d24f322243baab79cd68c635
kernel-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 48194e079344912e52d757cc4567f597f8f14db8742d29ed93c6c9d8757d8aaa
kernel-debuginfo-common-aarch64-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 682a7c88ba8cc50e660c3742992dc67a35bb068d48f0bce6f5aebe813dea4e58
kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 2d62a58f489483cdc2ccc0727016037a590b05919032bac18d592a1ef9e01c8f
kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 29b71bb0b8c421d6d9161833e0ee389d204329701bd95b0f34e922d1b8394f05
perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 5c68ccc119914e37141229d8716c2e1c0ac309322f7d8b9503773f02a39c6aef
python3-perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm
SHA-256: 043b350b5cee6556bdda6c6236cf7a384aea94f6f5ea65a6b1b453f51535679c
Related news
Red Hat Security Advisory 2023-4814-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-7434-01 - A Red Hat OpenShift security update has been provided for the Logging Subsystem.
An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...
Red Hat OpenShift Virtualization release 4.8.7 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1798: kubeVirt: Arbitrary file read on the host from KubeVirt VMs
Red Hat Security Advisory 2022-6681-01 - Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important.
Red Hat OpenShift Container Platform release 4.8.49 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (is...
Red Hat Security Advisory 2022-6322-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.59. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2022-6317-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.48. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 4.7.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2022-6248-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an information leakage vulnerability.
Red Hat Security Advisory 2022-6243-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an information leakage vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
Red Hat Security Advisory 2022-5934-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
Ubuntu Security Notice 5541-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5515-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5500-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Lin Ma discovered that the NFC Controller Interface implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.