Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5998: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Moderate: kernel security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • A kernel-info-leak issue in pfkey_register (CVE-2022-1353)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • kernel lockup/list corruption in semaphore code (BZ#2095494)
  • Need some changes in RHEL8.x kernels. (BZ#2096933)
  • backport “bnxt: don’t lock the tx queue from napi poll” (BZ#2100421)
  • net: openvswitch: fix parsing of nw_proto for IPv6 fragments (BZ#2106705)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64

Fixes

  • BZ - 2066819 - CVE-2022-1353 Kernel: A kernel-info-leak issue in pfkey_register

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

x86_64

bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5

bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4

kernel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423

kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751

kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04

kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b

kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38

kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4

kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e

kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea

kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b

kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c

kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d

kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804

kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553

perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263

perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092

python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324

Red Hat Enterprise Linux Server - AUS 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

x86_64

bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5

bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4

kernel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423

kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751

kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04

kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b

kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38

kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4

kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e

kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea

kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b

kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c

kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d

kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804

kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553

perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263

perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092

python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

s390x

bpftool-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 1065f6a78c5ca0bba8880fc0f5cf0403ee0245ac83c86f0b3176d0b1761ebf04

bpftool-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 4c2c9680f6a4e05def5e7358cec669e79bf94a9f095037e003fffbcb342ef691

kernel-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 04e446c14da56da9b08410465da3aad8f32b2f64268a8a2a6b96cfef20c022af

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: a31262e05f98ffe6181f7dbc33748a6cf6fe3955f7d7cf35f10799ad2abe760a

kernel-cross-headers-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 1df4391cfb24ad380be91509bcb2e0ca0e5a7355599b60b16e0732af7cf96c6a

kernel-debug-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 2e2f8544111f49f727a758b4ff3fe0221283200f96661eea2510fb295933e654

kernel-debug-core-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 99e72f3ae51861d14129d4ac8ebebbe203e569e3259b03ed033aca1f8f849d88

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 17d1df860b885e2356ef09fc90401e53d34f9e28e1c92bd3a1eaa9c78f93e306

kernel-debug-devel-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 11ff319f5692afd463dd8661777fe7abc366c0f918d155ca7f558db8f3304b3e

kernel-debug-modules-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: cd6c95b0788bdb0766ce940f977eb332db386b132204206676829634791a949f

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 522bbd2bbe46c64a7c7903dbc1981f7221c1df4bcf9be0e6f11d3e4497d89afc

kernel-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 64523c9b92621ae4728117177e818001e30377298df5a4dd9d89a173e58ea89d

kernel-debuginfo-common-s390x-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: c86de954c270fcc5106831f492515dddf9265b68a34a9d730c4f2581a29a549e

kernel-devel-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: bc4b5ee3af75db6db439492b399143565bfbba7b7e1ca941a5e05016155e412f

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: fa987e30923715b04616b58a0281f34a092e2dc9edf2b804f32fd5b359e4b9b3

kernel-modules-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: ad1af16537715f8bd1caa21b61cc5437d36a107f9a46ef408953bfd9cc4dd136

kernel-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 04233683818b90bd5307ca7c3668c795f2663a0829842d1fa6e8acf771c4fb4f

kernel-tools-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: d4501ec28c2b486cba5eaab4babbdbc492bb90fd0ab179d182982c83d9450e95

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: e35dbbfc649a3642e33a582f211273f04d88f33033c3329291f8335f44b5c21f

kernel-zfcpdump-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 054891b6baafed0c104f2f33d1f4967c8ba48ff29a332c7c688f3ea0c655adef

kernel-zfcpdump-core-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 72db0e2e6764cd3aa31494d0784cb7da77db9177c4b273d144f5d94063090231

kernel-zfcpdump-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 05539f8e3ac1f1346f53b7aa72b7d3aad038ae0b5710e190d1203ffe2b177e2f

kernel-zfcpdump-devel-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 3b0d2cd2873e8540af4bb1e444f6aa96675ef66d17ba4582713f1d41aa166678

kernel-zfcpdump-modules-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: b252a9c0d1852e80c5704a3393bfa41bd685259109e027e380ef88f277dd5b04

kernel-zfcpdump-modules-extra-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: f45791b7329d5a987bcff4efb9229b328483e3e1646ba424c1faa6ca2fee5b31

perf-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 9772b73ac789efbd87ef8a85456725f8d03570b0eca83d9cb355bdc89c1f6483

perf-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 0b1b4ec59676a886ffcabcea6e81d3c50c253af83f9990c9acb1281c46fd151d

python3-perf-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 1e10014ab316487c9f838973cf923e2a6f783caf1600b867c72d98cb02c73229

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.s390x.rpm

SHA-256: 3798b6e7838cc9d6c82c0094e86b3bde3bdaff79a1103d0a9cb3188e1898b990

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

ppc64le

bpftool-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: a464288ae44f154b7dd60399ddb2b60b9b8002b9eaad6a353c7906e5ebaaecb4

bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e

kernel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: d6dcd4557d219f2064edeafcf1d4fd536f0b06c4925294bf84ef6d2595bae092

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: f961232f68c19fa32d652adef93663ac6b35fe1b5ea27dcd737f0aeb7e2c6305

kernel-cross-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: f44be608724e506994a91b6ab855848b239651825de925271a9fac3ccd93f6ef

kernel-debug-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: b6e519169fe32f83add2b81a8094b412e723f0e2ea68044f8d904b866eda61da

kernel-debug-core-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 15948e4fc819a739a3321a3ed28dd3f40a837dc903045ad8d6cde775bea9d565

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce

kernel-debug-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: be9c0a6ff8d497c45218231e761707c5bd898053b005318887fdaee7c4c76399

kernel-debug-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: ba20e7e5d28b107d669ac9f5a9b7756fea3b552fdd20109927161f8ad035fea7

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: d808867b99532665b86b88e246e804bb9195616b3fd37576502b9efd3eebd381

kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6

kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7

kernel-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 42a54e99e106de2d1a08bac60b1311cbdb1fd060b7436ef052ded4f005b91848

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 76c3ca6534be5038cef6d0343b11eaafa36d04ae958ed4c4fedc9bf821416b8f

kernel-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 5a8e101df3b9327cd7c1835df15e42faf7ce0f6f28bb25c1c68e192f1ca1af88

kernel-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 21fc66f13261cd4996c374c2cf57277f183b2cc4cffcf1bc6efbca16d67fd6e8

kernel-tools-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: b6ff0063996e615da739508133152be12353c8b92d4c86e9b7d2b5f2a293ffdb

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621

kernel-tools-libs-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 22ec8fa5901b090a34ef2e1eac587ed6f8689004bcfe676173486d762a32a80e

perf-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: c11307710a33e6443aab3985da1a2d202e1614aaa6def80ddd5cab938d4632dd

perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4

python3-perf-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: e58bb7417ec1091af37443b9e37d7f6e722f41e3e5f91ce076b99093bc7535c0

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868

Red Hat Enterprise Linux Server - TUS 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

x86_64

bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5

bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4

kernel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423

kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751

kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04

kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b

kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38

kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4

kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e

kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea

kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b

kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c

kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d

kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804

kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553

perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263

perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092

python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

aarch64

bpftool-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 88a0716c19d53c91b8d2d96447c596c1b6f384fb517c7e65f1ef3286e122ee5d

bpftool-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 07cc17edbddfd2877bce4346e6438002c9e70b3a6c833ae00123a827ca025582

kernel-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: c60c4bcad15de6de2e9a895d6324896cd99c47abe755d20b05ecbc70749aabe0

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 4fa84f8c23146369450db1be59f07f858c70dfd5a9c1b48aa57619c63d2521aa

kernel-cross-headers-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 79d92fb98410d595328447a8790a034c1cc94d477c55a0110b19cf1078fc479b

kernel-debug-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: bed7bb6ea19e7631b9b2bcba510df091289b4a5fb4c261c32b1d03f6860ae68b

kernel-debug-core-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 1bb3bb8f2dd04af946ee28f07c759d4d4eb0e65fc72bacb1cdf1c12f1a956acf

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 15e0a0c2b41d1192584d6c445cccab9ed85c32a3d24f322243baab79cd68c635

kernel-debug-devel-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: af5993e12dfa1c14f5b18df89436927a813bcd0b02459052ddca6cb47f7e74e7

kernel-debug-modules-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 35b24460e6aaf80d026da53e048b5a6a5da287bb3bc69ffa33bce51eb8c75b9d

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 301f786b48e9c7272643e562afa56597e1c25ae9dd2a2918914a94f0e3aaa9f1

kernel-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 48194e079344912e52d757cc4567f597f8f14db8742d29ed93c6c9d8757d8aaa

kernel-debuginfo-common-aarch64-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 682a7c88ba8cc50e660c3742992dc67a35bb068d48f0bce6f5aebe813dea4e58

kernel-devel-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: dafeb46ef3ae5706c5d5238bb9cdf830ada113f34edc0368fa49cfd6f97be7de

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 214e589d9a5cb1d92b05bc6dfa408bdff33f02e450bce427d6a41f93a2d5d234

kernel-modules-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: d47bf2ff079ea96b2bb341de4879c777d40579b20e7d172e94d1015592bf2c7b

kernel-modules-extra-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 0ed2dba7045d4d13d5afe557226bebfc4fabca21259d5c81d214afa6ef17ec2b

kernel-tools-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 85c53587f0e3c7eafae7cea13609c694dd0c5c8aa6801229c047a4013b014993

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 2d62a58f489483cdc2ccc0727016037a590b05919032bac18d592a1ef9e01c8f

kernel-tools-libs-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 17e94ca9e76d2f5721a26a006149b952f7b46b632c5ac1ef0bd8819a5c616b84

perf-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 7c165f0c094e55c449c7386f272644349795fc4ad328f6d5261cec1abd6b3a32

perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 5c68ccc119914e37141229d8716c2e1c0ac309322f7d8b9503773f02a39c6aef

python3-perf-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: cf96f08934cc4df8f9aa8b6b8930115404224525b651a9fc482fc7f8e7818e37

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 043b350b5cee6556bdda6c6236cf7a384aea94f6f5ea65a6b1b453f51535679c

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

ppc64le

bpftool-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: a464288ae44f154b7dd60399ddb2b60b9b8002b9eaad6a353c7906e5ebaaecb4

bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e

kernel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: d6dcd4557d219f2064edeafcf1d4fd536f0b06c4925294bf84ef6d2595bae092

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: f961232f68c19fa32d652adef93663ac6b35fe1b5ea27dcd737f0aeb7e2c6305

kernel-cross-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: f44be608724e506994a91b6ab855848b239651825de925271a9fac3ccd93f6ef

kernel-debug-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: b6e519169fe32f83add2b81a8094b412e723f0e2ea68044f8d904b866eda61da

kernel-debug-core-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 15948e4fc819a739a3321a3ed28dd3f40a837dc903045ad8d6cde775bea9d565

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce

kernel-debug-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: be9c0a6ff8d497c45218231e761707c5bd898053b005318887fdaee7c4c76399

kernel-debug-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: ba20e7e5d28b107d669ac9f5a9b7756fea3b552fdd20109927161f8ad035fea7

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: d808867b99532665b86b88e246e804bb9195616b3fd37576502b9efd3eebd381

kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6

kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7

kernel-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 42a54e99e106de2d1a08bac60b1311cbdb1fd060b7436ef052ded4f005b91848

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 76c3ca6534be5038cef6d0343b11eaafa36d04ae958ed4c4fedc9bf821416b8f

kernel-modules-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 5a8e101df3b9327cd7c1835df15e42faf7ce0f6f28bb25c1c68e192f1ca1af88

kernel-modules-extra-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 21fc66f13261cd4996c374c2cf57277f183b2cc4cffcf1bc6efbca16d67fd6e8

kernel-tools-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: b6ff0063996e615da739508133152be12353c8b92d4c86e9b7d2b5f2a293ffdb

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621

kernel-tools-libs-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 22ec8fa5901b090a34ef2e1eac587ed6f8689004bcfe676173486d762a32a80e

perf-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: c11307710a33e6443aab3985da1a2d202e1614aaa6def80ddd5cab938d4632dd

perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4

python3-perf-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: e58bb7417ec1091af37443b9e37d7f6e722f41e3e5f91ce076b99093bc7535c0

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2

SRPM

kernel-4.18.0-193.90.1.el8_2.src.rpm

SHA-256: 58077e04e83be8e1bc38caaa7b84d26241228d78b8c3bc0f69c87e9a2749bf6d

x86_64

bpftool-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4ca110d907da81d413a18a650443f3b9a979b43274e9c260a86ece6cbbdbdea5

bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4

kernel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 841c7f06a462532dcab21746898e64011b8fd25679e2cf15c8e5335f01e45e6d

kernel-abi-whitelists-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 85ad69654868dab680197440e3d271eecd3325e66e216b09546c35e28d55a1ee

kernel-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 070bf3eb76fb5eac158977600b160476f1c56aa7d4facd4fcdc5876c677f7423

kernel-cross-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 1b82021b7c6289d84685a5965a003a8da2b76c9c4fda690091e0822037673751

kernel-debug-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80bc5027ae1c8a8cc0a77ecbe79af1634e8c88471d49c5fabc7a8e5a5469ad04

kernel-debug-core-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 3a6b7c6059a6470b4e90b5f31b2e05a348b028aae6ff5dd8834d738f0fd2a507

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b

kernel-debug-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: e6a454b2b86b38d61f5d59c62206572a6c6e74e19016f7f39a1e762706f38d38

kernel-debug-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 80b62a24f46f4ff4499fa1997cf52c0fe599b1f7684ebfdffd26759ef9554d96

kernel-debug-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 711bc616567eb6b7334743c900f8b7c1c77805a1d7b13f1bd86036195e3968b4

kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e

kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea

kernel-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: b3ec3d2bc3a5d8396a747b639add4c254d94bac352a4239a04bf5dbd02f3bf01

kernel-doc-4.18.0-193.90.1.el8_2.noarch.rpm

SHA-256: 35e462fbab0a6adf604ce6225d7254bc333eb823e608e764fca8f61e6f457c6e

kernel-headers-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: aa2c8c1682fa627d9acbbb7a567f8f5139ecad6b580f236a2cbf4fc9ce06f17b

kernel-modules-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 85c1b214e92a7f61849fa32340fb2489098fb9948e7c0525d87ca8744745c75c

kernel-modules-extra-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 0fde789b46bf879894e23baab9e5e63ae5d9d81a9bf99ea183dd720c5f14247d

kernel-tools-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba245cd6782fafc43d0cddb63f17f481f39e11bc6e8780ded1522eae7e038c21

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804

kernel-tools-libs-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 89fae02e9d4b1c80b56be1766f0a85c12550d849d5c68c3788a1dfab60e87553

perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: d72fbfa482a7558c1ef9b3c5442f758148bb92178c3b7f8bc4b991fbde8e8263

perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092

python3-perf-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 66c0b29fa33e2361d859237e76fb82c829f79d51c8769fcdb63b0cfe0784df86

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2

SRPM

x86_64

bpftool-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: ba9704804ff7477b17963024595e8e0291eaeb9703b70b51d2f43ea7bf2c30b4

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 4e9b1e3f55af3a70e2c6205edd73ac9efef2fc542a99ae57014149d70654290b

kernel-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f6bd6ba15d71a46d9731babdb5b2dfc33d63fc813091c75579c721bfa427e82e

kernel-debuginfo-common-x86_64-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 8c3c96b95f483386bc5d82581a157a4ca1d9dfbb47fb8770c9f10323684443ea

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: c145467a888b33a5e02ab11f2138ec8a3771eedbc3f2fd90037ee02a1ccee804

kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 67bf4233161a0f728b8f6f138e8e6b12092c9dc6fd82335743e75748d42c58c5

perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: f9cb7545671e0f27ab41b19a028e3a0298d5c3bcadf7f46ce429710ca9f61092

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.x86_64.rpm

SHA-256: 21bae0606789369f6587828b3b9a42ef08edd6c11110a8fa25126832b690b324

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2

SRPM

ppc64le

bpftool-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 06f354308dfe6308e69fa1dcf190cef01ff0ca308e66795c21ca4eff31f99d5e

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 23b6263e0bdd9a4f8db09558ee2b6e19d4007c19e331780f7b49fcf896d1f8ce

kernel-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 2b9ebd5866571af5f96a24f849929f23e9b20312a9e68bb7c57bdee5b10802e6

kernel-debuginfo-common-ppc64le-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 090e3f0dc84b0313c274d9662e1dd0afc07717800f23cbb65a9dbaf5c8ccdad7

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 1b62d2c9473cf2bc7faa878787274b3d814e1a7906ebfe29b1278514f1d39621

kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 5c96d3b6cc82d9b41f361857fca75ad018d99cdf0c8a457b424c19853ac90644

perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: bc39513cfc89b6c3a407296fdbaadd75c59036089d2349b9da53c5acfec68df4

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.ppc64le.rpm

SHA-256: 89b0d0e11c87b8052c72778204d9c8143f8bc167d0d32fd85f34915d757cc868

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2

SRPM

aarch64

bpftool-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 07cc17edbddfd2877bce4346e6438002c9e70b3a6c833ae00123a827ca025582

kernel-debug-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 15e0a0c2b41d1192584d6c445cccab9ed85c32a3d24f322243baab79cd68c635

kernel-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 48194e079344912e52d757cc4567f597f8f14db8742d29ed93c6c9d8757d8aaa

kernel-debuginfo-common-aarch64-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 682a7c88ba8cc50e660c3742992dc67a35bb068d48f0bce6f5aebe813dea4e58

kernel-tools-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 2d62a58f489483cdc2ccc0727016037a590b05919032bac18d592a1ef9e01c8f

kernel-tools-libs-devel-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 29b71bb0b8c421d6d9161833e0ee389d204329701bd95b0f34e922d1b8394f05

perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 5c68ccc119914e37141229d8716c2e1c0ac309322f7d8b9503773f02a39c6aef

python3-perf-debuginfo-4.18.0-193.90.1.el8_2.aarch64.rpm

SHA-256: 043b350b5cee6556bdda6c6236cf7a384aea94f6f5ea65a6b1b453f51535679c

Related news

Red Hat Security Advisory 2023-4814-01

Red Hat Security Advisory 2023-4814-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include null pointer, out of bounds write, and use-after-free vulnerabilities.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2022-7933-01

Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-7434-01

Red Hat Security Advisory 2022-7434-01 - A Red Hat OpenShift security update has been provided for the Logging Subsystem.

RHSA-2022:6882: Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release

An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7313-01

Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2022-7201-01

Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.

RHSA-2022:7134: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register * CVE-2022-2588: kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation * CVE-2022-23816: hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions * CVE-2022-23825: hw: c...

RHSA-2022:6890: Red Hat Security Advisory: OpenShift Virtualization 4.8.7 Images bug fixes and security update

Red Hat OpenShift Virtualization release 4.8.7 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1798: kubeVirt: Arbitrary file read on the host from KubeVirt VMs

Red Hat Security Advisory 2022-6681-01

Red Hat Security Advisory 2022-6681-01 - Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important.

RHSA-2022:6308: Red Hat Security Advisory: OpenShift Container Platform 4.8.49 security update

Red Hat OpenShift Container Platform release 4.8.49 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go-getter: unsafe download (is...

Red Hat Security Advisory 2022-6322-01

Red Hat Security Advisory 2022-6322-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.59. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2022-6317-01

Red Hat Security Advisory 2022-6317-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.48. Issues addressed include a bypass vulnerability.

RHSA-2022:6322: Red Hat Security Advisory: OpenShift Container Platform 4.7.59 bug fix and security update

Red Hat OpenShift Container Platform release 4.7.59 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

RHSA-2022:6318: Red Hat Security Advisory: OpenShift Container Platform 4.9.48 extras security update

Red Hat OpenShift Container Platform release 4.9.48 is now available with updates to packages and images that fix several bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-6263-01

Red Hat Security Advisory 2022-6263-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include denial of service and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-6258-01

Red Hat Security Advisory 2022-6258-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.31. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2022-6248-01

Red Hat Security Advisory 2022-6248-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an information leakage vulnerability.

Red Hat Security Advisory 2022-6243-01

Red Hat Security Advisory 2022-6243-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an information leakage vulnerability.

RHSA-2022:6243: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register

RHSA-2022:6248: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0494: kernel: information leak in scsi_ioctl() * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register

Red Hat Security Advisory 2022-5934-01

Red Hat Security Advisory 2022-5934-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

RHSA-2022:5934: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1353: Kernel: A kernel-info-leak issue in pfkey_register

Ubuntu Security Notice USN-5541-1

Ubuntu Security Notice 5541-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5515-1

Ubuntu Security Notice 5515-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5513-1

Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5505-1

Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5500-1

Ubuntu Security Notice 5500-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Lin Ma discovered that the NFC Controller Interface implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5467-1

Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.