Headline
RHSA-2023:0440: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
- CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
- hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Azure: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155273)
- Azure: VM Deployment Failures Patch Request (BZ#2155281)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
- BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/solutions/6971358
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
x86_64
bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513
kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519
kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127
kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6
kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e
kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a
kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b
kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40
perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
x86_64
bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513
kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519
kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127
kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6
kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e
kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a
kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b
kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40
perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
s390x
bpftool-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: ea345667b19ff1fc16721bf6310795c262bb08cb52d8e1f43a0284fa7f2217f2
bpftool-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 2b1db598289e3a109ec4b7ec4fda71d62d675b039f696b908ba4a13bc7b210d2
kernel-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: f480818fcef88f5de6ee7624a8737b5489df5ed8f2d32711b3286321ace2f3b2
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 41ebfefdd85b98d9d32cdf974efde05f0e9670a61f8167e95bac8469a139d701
kernel-cross-headers-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: def5e275766d159882030bb7eeb22ab71eacffeee6252dff1f473765ed3e5dc7
kernel-debug-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 0a9681ac2267aed9e36a6f18ded081aa4483dd62157c62c6f677c88e2bc0239d
kernel-debug-core-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: c8cf1542c59c21c11e7320349983995e7df443eb9431e2c9c74fefda75c41621
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 6d195087f48403ab621ec7b21262951eb4deee33a74cefb460d92b4c0ff0c2b7
kernel-debug-devel-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: f09d97f33bcfb40fc8e9df633aefb143d088f4956363f5dd7f51923e81bf27c1
kernel-debug-modules-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: f1dc19bc0a54e9d6900aa714fac2320627b453e9d33866f363793b69a8a903b5
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 331ee18f43bb5fd37da2d9eecf1523d1d801be0b3399d64e21a1562fa164dd6f
kernel-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 69c5c697333490006358c90f6eb6034300b0be16ffa1ed329fb5c47dc5c55a21
kernel-debuginfo-common-s390x-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: ed1ac18ca2930a94403ecb16f8415d13161c00dd62c250a4b2403a2f0137b730
kernel-devel-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: d85e6b6abd214fcf047e8c12a8ac81918b3762781a0df59fba4e248b50bec984
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: eca5e307cd5b0edad3485bc32f3394a58bbea6e1e879385e176cf1b8e4049d28
kernel-modules-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 68ec36e9e28ca37a1e8556f4911f44ebe12231100bb237fea35a922eba2a8499
kernel-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 2ac5b5fdd98c0546d9b9072391498dbe190b2135f6262abd15548e019fc1bf40
kernel-tools-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 6f6639a886883b195062cdffd9cdf8062f298b2f67d926ec414f8dde8c84a549
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 9e785af8d01a58b6f10501699bbb1848b12ef7055b800bb6aaf7530a696aeb7a
kernel-zfcpdump-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 3dd15964f4797e8fa563c969b7d56734c6b2c7b0cf080345a7d0b4158ef4b92b
kernel-zfcpdump-core-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: ea8d82ed1f3b9cd571288b9d7b3c512a8c066e322c47913cd70a98d0be9bf0e3
kernel-zfcpdump-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 90a249edc6dbe16aad463b68af8186c08e88be6f510969760a8184f0e319c3a8
kernel-zfcpdump-devel-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: c485b6c0508c83bff743b430b56be2607c58f95b222084d9672f3f841c20088b
kernel-zfcpdump-modules-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 70ca24f0abd0fede656ebe1a5148356b937f3a2fa8b867c68c57450d6ac812df
kernel-zfcpdump-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 4cc81ff2b89810099096754cee533f1f433358cc2d106e6e9a89aeae74884335
perf-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 5a803759713d81c1aa7a2e757e274b48ac64ba18bfa3df29cef174a59c49a167
perf-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 2d20f23f105e5c34468732af13ce5980bfc7eaab33903940920e23c587e7e1c9
python3-perf-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: 7d1a3a45a583c806c0b146cd14c4bd1a9fcb58ce18d8b66152bd38b2144b7533
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm
SHA-256: f60681415911df438bbb095dbbeff6f98a0a4dbade6884a11a31d6edcfe3b59a
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
ppc64le
bpftool-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 4c28ef19dc3ae7915b54c00bf3459156b045b1eb2dfc684584c1e6639f80c18c
bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a
kernel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 6a3211213012d71e574983a7917357cbc43e5eb70a151e7c9a249562cb8b8273
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 6950864e1d5f51b4131be56a2a28a5c21398d820e51dfab8cfb9b6c88ea4c2bc
kernel-cross-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 1acf92085fd55a0147abf7f8a5a468ac463f61fd04456b2581167815eea4fde7
kernel-debug-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 8497696cee6f6f2bb9a2c9c91288d15c34d65d94a7625c1cb91f27c0faca505b
kernel-debug-core-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: cd26c6bd3609a1bdb907430dec469ded70926a0de84814a1738185409113018a
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085
kernel-debug-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 460e78a55fb95cb0d4cf1799b4b38aae11a06378dec82a188c45cb0b08f84cbc
kernel-debug-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: a6a050e95610d3097c80187cae6cdc5611fbc117dfdd3edbf6a31ad6e7dc9c5a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 0fdd42c132c1d2c4319785371c83b8f82e2f66b772c8c542d57161527982858e
kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31
kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab
kernel-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: cf31061befae55348fba7d0a8d2e1fc879963301746a06211f895db187c57d32
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 02451cf034ad80ded379630d58af5b2935e30d7b9f9166f44c11d3e0bdb9a010
kernel-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 659f95ece75b2d4ca062fd07d4a21dad420ddcd277336e2641c4a86f62413eca
kernel-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: ac1da4a244b99be21e6b9284010ce17bc6ce66fc282a2128b9c1a6b0117d09ec
kernel-tools-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 3a69c7f75b21db2ed927246d26fbf01be0f928f95b196fa43015e3e203700af0
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f
kernel-tools-libs-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 5a752bbd8c64a2dfcfd059c7d76cb281df2a74101cfe4833cb9c8dd598566c69
perf-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: dff8045b1f4178b3372d29934894719e7bb2eabc271690da959ca43383f19b4a
perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad
python3-perf-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 564627de8db1e4afb3f3b154ac21e7075050dea1bf0fba2be29dec6bbeedd861
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0
kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
x86_64
bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513
kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519
kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127
kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6
kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e
kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a
kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b
kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40
perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
aarch64
bpftool-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 95ae2529ff3fd7e25033a32c02eb20e589cf651c6bd7a334fa341a6cb4045867
bpftool-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 9097a53f65cbd82a868b54dda97032646e8c185a96cb6a4447dbb140458b5f60
kernel-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 2de5d97c18a965c8504757525f3896af9a76159c175a88abf56c1d1fecb24706
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 4a2c4b2f396691bdf635349e08584f6e2e369330624f4e9542df6ffc741fa762
kernel-cross-headers-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: cfecdadddeb12f3910ff50c8b0322d84e3d84761e69025a13e851a8db281e056
kernel-debug-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 4cced6cbd8126092fa42c19bce5a97041dc9f9f5a145012bf3d0cac96b63cab4
kernel-debug-core-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 07477b1323209eb5e621accb03817fad1ca6850e005ac543892d6df267f27780
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 105ef6faa1a85c5687fd5a11a043daebc1f8551ee3b67bbf87e37901d259d7a4
kernel-debug-devel-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 566ad03ed6fca0e54080828f484025085b6ff7424a8a41d732df47c0116dfd78
kernel-debug-modules-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 85f7e10bbfdbf36d9fddbdb9320eccae78894af61edb208654905ea7d429b49b
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: bb8d85d62ed119a423c006ff27ecf70b139fc175ab656d78e13997a56e0076e6
kernel-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: b281b0081e50e420cf47f1b601c12cbf4d558aedb50210fb7656ba615bcd9ded
kernel-debuginfo-common-aarch64-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 31916256b0d82842ff4cb217d7e50560dfc92e0f5a3edde1736ebcabf79a9d79
kernel-devel-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 46103728438cbfa4d08babed5ef2d3b6f76d05b97516797e71db5b9e051624ce
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 6cd6a8e35b68743d67c5add0a96b6c22448c7b876885692b108a863aa32fc84e
kernel-modules-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: c7946f2357d54e8f7d7c1c698e67cab4c77a2e57a6a58b0b47e67b924cb6c583
kernel-modules-extra-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 8cbbc7f7c11d48c87f5b4be999555989af11d7e0bbbd7b78800680084274afc6
kernel-tools-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 639176b3ca95fbd5074b51e237cc2b817184792f7f4a7587c1354852f521665e
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 1b690adab8c5cf304b2b8dd3951d2d81be3b009c90aefc578614d0176ddd0bcf
kernel-tools-libs-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: df734acb99fe2971bef708e8168196387af64f58365505732efcf5fafa23baa1
perf-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 496033e93f073cd122244351310b07bb95464a162aa8146220e3e8146a38962b
perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: eecea859ba3faa6338cdda9ecb75af68dfdb70b65157c3d3e11113c6ceeb82ff
python3-perf-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 296556b6fd4cf11dd9749e7c9e275c5187051ec31632711e410215ac5bd74f16
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 97354a1ddb98349d8b898decec8e9e2d7587837e9e0ea6c4adf55c1938cd36ec
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
ppc64le
bpftool-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 4c28ef19dc3ae7915b54c00bf3459156b045b1eb2dfc684584c1e6639f80c18c
bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a
kernel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 6a3211213012d71e574983a7917357cbc43e5eb70a151e7c9a249562cb8b8273
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 6950864e1d5f51b4131be56a2a28a5c21398d820e51dfab8cfb9b6c88ea4c2bc
kernel-cross-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 1acf92085fd55a0147abf7f8a5a468ac463f61fd04456b2581167815eea4fde7
kernel-debug-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 8497696cee6f6f2bb9a2c9c91288d15c34d65d94a7625c1cb91f27c0faca505b
kernel-debug-core-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: cd26c6bd3609a1bdb907430dec469ded70926a0de84814a1738185409113018a
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085
kernel-debug-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 460e78a55fb95cb0d4cf1799b4b38aae11a06378dec82a188c45cb0b08f84cbc
kernel-debug-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: a6a050e95610d3097c80187cae6cdc5611fbc117dfdd3edbf6a31ad6e7dc9c5a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 0fdd42c132c1d2c4319785371c83b8f82e2f66b772c8c542d57161527982858e
kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31
kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab
kernel-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: cf31061befae55348fba7d0a8d2e1fc879963301746a06211f895db187c57d32
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 02451cf034ad80ded379630d58af5b2935e30d7b9f9166f44c11d3e0bdb9a010
kernel-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 659f95ece75b2d4ca062fd07d4a21dad420ddcd277336e2641c4a86f62413eca
kernel-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: ac1da4a244b99be21e6b9284010ce17bc6ce66fc282a2128b9c1a6b0117d09ec
kernel-tools-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 3a69c7f75b21db2ed927246d26fbf01be0f928f95b196fa43015e3e203700af0
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f
kernel-tools-libs-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 5a752bbd8c64a2dfcfd059c7d76cb281df2a74101cfe4833cb9c8dd598566c69
perf-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: dff8045b1f4178b3372d29934894719e7bb2eabc271690da959ca43383f19b4a
perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad
python3-perf-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 564627de8db1e4afb3f3b154ac21e7075050dea1bf0fba2be29dec6bbeedd861
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.41.1.el8_6.src.rpm
SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc
x86_64
bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b
kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5
kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513
kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519
kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127
kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6
kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a
kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0
kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm
SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250
kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e
kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a
kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b
kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40
perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1
kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87
kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9
kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: da2cd9139f579b9a33b64f357322209c1448143eb100bab8d546df5c57dcc3ba
perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm
SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085
kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31
kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f
kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 847ab871ecb2d7c9500b2b0c9da71d7ef77786f2fb88169445e671cc358b618c
perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm
SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 9097a53f65cbd82a868b54dda97032646e8c185a96cb6a4447dbb140458b5f60
kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 105ef6faa1a85c5687fd5a11a043daebc1f8551ee3b67bbf87e37901d259d7a4
kernel-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: b281b0081e50e420cf47f1b601c12cbf4d558aedb50210fb7656ba615bcd9ded
kernel-debuginfo-common-aarch64-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 31916256b0d82842ff4cb217d7e50560dfc92e0f5a3edde1736ebcabf79a9d79
kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 1b690adab8c5cf304b2b8dd3951d2d81be3b009c90aefc578614d0176ddd0bcf
kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 6a13cd305592889938d3da0a0b9c211691d4a9596c34e26c0702820a352a5b0b
perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: eecea859ba3faa6338cdda9ecb75af68dfdb70b65157c3d3e11113c6ceeb82ff
python3-perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm
SHA-256: 97354a1ddb98349d8b898decec8e9e2d7587837e9e0ea6c4adf55c1938cd36ec
Related news
Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.
Ubuntu Security Notice 6221-1 - It was discovered that a race condition existed in the overlay file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service. It was discovered that the virtual terminal device implementation in the Linux kernel contained a race condition in its ioctl handling that led to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6124-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service.
Ubuntu Security Notice 6089-1 - It was discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5951-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5917-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0859-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include code execution and integer overflow vulnerabilities.
Red Hat Security Advisory 2023-0794-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload i...
Ubuntu Security Notice 5865-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Ubuntu Security Notice 5854-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.
Red Hat Security Advisory 2023-0536-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0526-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...
Red Hat Security Advisory 2023-0114-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.
Red Hat Security Advisory 2022-8974-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, code execution, out of bounds write, and privilege escalation vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...
Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large argume...
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.