Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0440: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
  • CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
Red Hat Security Data
#vulnerability#linux#red_hat#intel#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
  • hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Azure: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155273)
  • Azure: VM Deployment Failures Patch Request (BZ#2155281)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 2115065 - CVE-2022-26373 hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
  • BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/solutions/6971358

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

x86_64

bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513

kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519

kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127

kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6

kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e

kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a

kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b

kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40

perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

x86_64

bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513

kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519

kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127

kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6

kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e

kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a

kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b

kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40

perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

s390x

bpftool-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: ea345667b19ff1fc16721bf6310795c262bb08cb52d8e1f43a0284fa7f2217f2

bpftool-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 2b1db598289e3a109ec4b7ec4fda71d62d675b039f696b908ba4a13bc7b210d2

kernel-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: f480818fcef88f5de6ee7624a8737b5489df5ed8f2d32711b3286321ace2f3b2

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 41ebfefdd85b98d9d32cdf974efde05f0e9670a61f8167e95bac8469a139d701

kernel-cross-headers-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: def5e275766d159882030bb7eeb22ab71eacffeee6252dff1f473765ed3e5dc7

kernel-debug-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 0a9681ac2267aed9e36a6f18ded081aa4483dd62157c62c6f677c88e2bc0239d

kernel-debug-core-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: c8cf1542c59c21c11e7320349983995e7df443eb9431e2c9c74fefda75c41621

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 6d195087f48403ab621ec7b21262951eb4deee33a74cefb460d92b4c0ff0c2b7

kernel-debug-devel-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: f09d97f33bcfb40fc8e9df633aefb143d088f4956363f5dd7f51923e81bf27c1

kernel-debug-modules-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: f1dc19bc0a54e9d6900aa714fac2320627b453e9d33866f363793b69a8a903b5

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 331ee18f43bb5fd37da2d9eecf1523d1d801be0b3399d64e21a1562fa164dd6f

kernel-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 69c5c697333490006358c90f6eb6034300b0be16ffa1ed329fb5c47dc5c55a21

kernel-debuginfo-common-s390x-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: ed1ac18ca2930a94403ecb16f8415d13161c00dd62c250a4b2403a2f0137b730

kernel-devel-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: d85e6b6abd214fcf047e8c12a8ac81918b3762781a0df59fba4e248b50bec984

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: eca5e307cd5b0edad3485bc32f3394a58bbea6e1e879385e176cf1b8e4049d28

kernel-modules-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 68ec36e9e28ca37a1e8556f4911f44ebe12231100bb237fea35a922eba2a8499

kernel-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 2ac5b5fdd98c0546d9b9072391498dbe190b2135f6262abd15548e019fc1bf40

kernel-tools-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 6f6639a886883b195062cdffd9cdf8062f298b2f67d926ec414f8dde8c84a549

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 9e785af8d01a58b6f10501699bbb1848b12ef7055b800bb6aaf7530a696aeb7a

kernel-zfcpdump-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 3dd15964f4797e8fa563c969b7d56734c6b2c7b0cf080345a7d0b4158ef4b92b

kernel-zfcpdump-core-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: ea8d82ed1f3b9cd571288b9d7b3c512a8c066e322c47913cd70a98d0be9bf0e3

kernel-zfcpdump-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 90a249edc6dbe16aad463b68af8186c08e88be6f510969760a8184f0e319c3a8

kernel-zfcpdump-devel-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: c485b6c0508c83bff743b430b56be2607c58f95b222084d9672f3f841c20088b

kernel-zfcpdump-modules-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 70ca24f0abd0fede656ebe1a5148356b937f3a2fa8b867c68c57450d6ac812df

kernel-zfcpdump-modules-extra-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 4cc81ff2b89810099096754cee533f1f433358cc2d106e6e9a89aeae74884335

perf-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 5a803759713d81c1aa7a2e757e274b48ac64ba18bfa3df29cef174a59c49a167

perf-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 2d20f23f105e5c34468732af13ce5980bfc7eaab33903940920e23c587e7e1c9

python3-perf-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: 7d1a3a45a583c806c0b146cd14c4bd1a9fcb58ce18d8b66152bd38b2144b7533

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.s390x.rpm

SHA-256: f60681415911df438bbb095dbbeff6f98a0a4dbade6884a11a31d6edcfe3b59a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

ppc64le

bpftool-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 4c28ef19dc3ae7915b54c00bf3459156b045b1eb2dfc684584c1e6639f80c18c

bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a

kernel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 6a3211213012d71e574983a7917357cbc43e5eb70a151e7c9a249562cb8b8273

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 6950864e1d5f51b4131be56a2a28a5c21398d820e51dfab8cfb9b6c88ea4c2bc

kernel-cross-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 1acf92085fd55a0147abf7f8a5a468ac463f61fd04456b2581167815eea4fde7

kernel-debug-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 8497696cee6f6f2bb9a2c9c91288d15c34d65d94a7625c1cb91f27c0faca505b

kernel-debug-core-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: cd26c6bd3609a1bdb907430dec469ded70926a0de84814a1738185409113018a

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085

kernel-debug-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 460e78a55fb95cb0d4cf1799b4b38aae11a06378dec82a188c45cb0b08f84cbc

kernel-debug-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: a6a050e95610d3097c80187cae6cdc5611fbc117dfdd3edbf6a31ad6e7dc9c5a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 0fdd42c132c1d2c4319785371c83b8f82e2f66b772c8c542d57161527982858e

kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31

kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab

kernel-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: cf31061befae55348fba7d0a8d2e1fc879963301746a06211f895db187c57d32

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 02451cf034ad80ded379630d58af5b2935e30d7b9f9166f44c11d3e0bdb9a010

kernel-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 659f95ece75b2d4ca062fd07d4a21dad420ddcd277336e2641c4a86f62413eca

kernel-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: ac1da4a244b99be21e6b9284010ce17bc6ce66fc282a2128b9c1a6b0117d09ec

kernel-tools-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 3a69c7f75b21db2ed927246d26fbf01be0f928f95b196fa43015e3e203700af0

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f

kernel-tools-libs-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 5a752bbd8c64a2dfcfd059c7d76cb281df2a74101cfe4833cb9c8dd598566c69

perf-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: dff8045b1f4178b3372d29934894719e7bb2eabc271690da959ca43383f19b4a

perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad

python3-perf-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 564627de8db1e4afb3f3b154ac21e7075050dea1bf0fba2be29dec6bbeedd861

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0

kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

x86_64

bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513

kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519

kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127

kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6

kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e

kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a

kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b

kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40

perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

aarch64

bpftool-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 95ae2529ff3fd7e25033a32c02eb20e589cf651c6bd7a334fa341a6cb4045867

bpftool-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 9097a53f65cbd82a868b54dda97032646e8c185a96cb6a4447dbb140458b5f60

kernel-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 2de5d97c18a965c8504757525f3896af9a76159c175a88abf56c1d1fecb24706

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 4a2c4b2f396691bdf635349e08584f6e2e369330624f4e9542df6ffc741fa762

kernel-cross-headers-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: cfecdadddeb12f3910ff50c8b0322d84e3d84761e69025a13e851a8db281e056

kernel-debug-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 4cced6cbd8126092fa42c19bce5a97041dc9f9f5a145012bf3d0cac96b63cab4

kernel-debug-core-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 07477b1323209eb5e621accb03817fad1ca6850e005ac543892d6df267f27780

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 105ef6faa1a85c5687fd5a11a043daebc1f8551ee3b67bbf87e37901d259d7a4

kernel-debug-devel-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 566ad03ed6fca0e54080828f484025085b6ff7424a8a41d732df47c0116dfd78

kernel-debug-modules-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 85f7e10bbfdbf36d9fddbdb9320eccae78894af61edb208654905ea7d429b49b

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: bb8d85d62ed119a423c006ff27ecf70b139fc175ab656d78e13997a56e0076e6

kernel-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: b281b0081e50e420cf47f1b601c12cbf4d558aedb50210fb7656ba615bcd9ded

kernel-debuginfo-common-aarch64-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 31916256b0d82842ff4cb217d7e50560dfc92e0f5a3edde1736ebcabf79a9d79

kernel-devel-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 46103728438cbfa4d08babed5ef2d3b6f76d05b97516797e71db5b9e051624ce

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 6cd6a8e35b68743d67c5add0a96b6c22448c7b876885692b108a863aa32fc84e

kernel-modules-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: c7946f2357d54e8f7d7c1c698e67cab4c77a2e57a6a58b0b47e67b924cb6c583

kernel-modules-extra-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 8cbbc7f7c11d48c87f5b4be999555989af11d7e0bbbd7b78800680084274afc6

kernel-tools-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 639176b3ca95fbd5074b51e237cc2b817184792f7f4a7587c1354852f521665e

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 1b690adab8c5cf304b2b8dd3951d2d81be3b009c90aefc578614d0176ddd0bcf

kernel-tools-libs-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: df734acb99fe2971bef708e8168196387af64f58365505732efcf5fafa23baa1

perf-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 496033e93f073cd122244351310b07bb95464a162aa8146220e3e8146a38962b

perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: eecea859ba3faa6338cdda9ecb75af68dfdb70b65157c3d3e11113c6ceeb82ff

python3-perf-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 296556b6fd4cf11dd9749e7c9e275c5187051ec31632711e410215ac5bd74f16

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 97354a1ddb98349d8b898decec8e9e2d7587837e9e0ea6c4adf55c1938cd36ec

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

ppc64le

bpftool-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 4c28ef19dc3ae7915b54c00bf3459156b045b1eb2dfc684584c1e6639f80c18c

bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a

kernel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 6a3211213012d71e574983a7917357cbc43e5eb70a151e7c9a249562cb8b8273

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 6950864e1d5f51b4131be56a2a28a5c21398d820e51dfab8cfb9b6c88ea4c2bc

kernel-cross-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 1acf92085fd55a0147abf7f8a5a468ac463f61fd04456b2581167815eea4fde7

kernel-debug-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 8497696cee6f6f2bb9a2c9c91288d15c34d65d94a7625c1cb91f27c0faca505b

kernel-debug-core-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: cd26c6bd3609a1bdb907430dec469ded70926a0de84814a1738185409113018a

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085

kernel-debug-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 460e78a55fb95cb0d4cf1799b4b38aae11a06378dec82a188c45cb0b08f84cbc

kernel-debug-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: a6a050e95610d3097c80187cae6cdc5611fbc117dfdd3edbf6a31ad6e7dc9c5a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 0fdd42c132c1d2c4319785371c83b8f82e2f66b772c8c542d57161527982858e

kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31

kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab

kernel-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: cf31061befae55348fba7d0a8d2e1fc879963301746a06211f895db187c57d32

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 02451cf034ad80ded379630d58af5b2935e30d7b9f9166f44c11d3e0bdb9a010

kernel-modules-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 659f95ece75b2d4ca062fd07d4a21dad420ddcd277336e2641c4a86f62413eca

kernel-modules-extra-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: ac1da4a244b99be21e6b9284010ce17bc6ce66fc282a2128b9c1a6b0117d09ec

kernel-tools-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 3a69c7f75b21db2ed927246d26fbf01be0f928f95b196fa43015e3e203700af0

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f

kernel-tools-libs-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 5a752bbd8c64a2dfcfd059c7d76cb281df2a74101cfe4833cb9c8dd598566c69

perf-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: dff8045b1f4178b3372d29934894719e7bb2eabc271690da959ca43383f19b4a

perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad

python3-perf-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 564627de8db1e4afb3f3b154ac21e7075050dea1bf0fba2be29dec6bbeedd861

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.41.1.el8_6.src.rpm

SHA-256: 40d7eda99e5c79222fc952563ae59ef017e89d72dfa6f820d991511d28ce0dfc

x86_64

bpftool-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: f4adee8900c4b206c351f34fd3601d06f4cdf19559c16099c157781c0c1ece36

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: b4873dd5a28e7f0872b2ffcd5d6ab48f037f325525a540a5cf1bd240b05fa13b

kernel-abi-stablelists-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 526785b3c172f23878830e071272a43efb9594a8bf6074be080c0b16368a75d5

kernel-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: fadce58a934e01a4277af92a86e5a5f64a0259d1096e3f9912d7075ddc738513

kernel-cross-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 40af44cf1ba553ea02315c7d027d17dbf2408fb55baab698bc0e26e75e803519

kernel-debug-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 94ca4a2c6d6cdd105a39223c95f302e6f42204cf1b027c15cbd4d5e14f9a7127

kernel-debug-core-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 28171ba79f22112639ad9109455a4f94c273d7eccdae8559abde326af725436c

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debug-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 86503792baeddedf148764f8c741ead8a4a292bdbd0c3a19aa7a28acd907b3f6

kernel-debug-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7c2a42946993fe6b75eeee7659db14c278f692ef229b665ff5018ca54987929a

kernel-debug-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 47ad3691bab93008d6804e078d2141f29ed8288e40b71cbe18a3726b06e73e8b

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: d99d942dbbcbe89168ca93d7dd42eb2905b688ba34557dab8128f7c53d219fe0

kernel-doc-4.18.0-372.41.1.el8_6.noarch.rpm

SHA-256: 564cc94b6666792ea5b507e979f49aa9f482d23ea3c0a8b9226ad2955394d250

kernel-headers-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7aa6d959eadd96425c1cf966f35810c4f5e40a37d5ddea595335c1a67335224e

kernel-modules-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 93b3a43e24a1fe608cfeffac1b50290e70124eb82dc6933d0d45f741b40d9f6a

kernel-modules-extra-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: c6bbe8692dbfdb8e76bb7310feffae4a098190c1da92ffdd4d8b49c56d65a23b

kernel-tools-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 5192d0eb448ba37b5a84634c5d52cb34168668f54dbf023701a973ca2321ab59

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

kernel-tools-libs-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ffc18c094388baeffdff7b38c24cfcfb4880b12762a20eef16c9a83c30c83c40

perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 17e944bab3745ee26fc75b012751ac8c38c12cbbd09577a3b5456dfda99a1dea

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66a564560f2d7a98598d30f9206a766f82d23a2218d4631859354cc41ada6299

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 818a96b23713a7bf0d3cef881557122e5280b7443d74d1a3fafd111ec7a09833

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 39385337560d8ed6a16532fe7d69ff33bc0d7664a575fc50f840379c22b323a1

kernel-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ab893b50b133b0906d7a3acb0cab995651f723c8374e1e706de1aa506afa9b87

kernel-debuginfo-common-x86_64-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 33bd44a9c49ad77a7833bc7fd2e7e5a09421bdda0bd34c443fae5bb9a3d64814

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: ee83b404bafc6c5218a23e59ab77a21cc8a563dbd05a0187b04fc06c22db5df9

kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: da2cd9139f579b9a33b64f357322209c1448143eb100bab8d546df5c57dcc3ba

perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 7d100251724ebe1d22fc0f69dee0bab2df61ce298dd28fbd01f2ba9b7d0369d4

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.x86_64.rpm

SHA-256: 66895b4786adabcaf7cdc39286ea870ca33d3d1b89aec7ed12ebeee0e6f2bd2c

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d19cc6d1a2cd3c9f803f69b9a2b58df7972520610406a44d27fa05906efeda9a

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: a85cf15f26e8295e0608ff988e835ccf64b3e0b382aeb82f8655109e5faa8085

kernel-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 88438fd90d8f5d1cc4a9da58cf6ed22e561cf4dec4b6dcd796dbf26f6e69cb31

kernel-debuginfo-common-ppc64le-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 44a40a1958c1820b8a545f7b35884cea7ef3a599db4c153e79ddef83e7082cab

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: d075a117740ddce88cbecc5dbb82a6a54cff1a655987cb9dabd6ba7efe83471f

kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 847ab871ecb2d7c9500b2b0c9da71d7ef77786f2fb88169445e671cc358b618c

perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 7d83a9fb551f653b06e29998c7808eb9452860e28efca81ec56e7a49e01b16ad

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.ppc64le.rpm

SHA-256: 29bdc481c0400840e39f6ed97ab76eac3451075583fde3e6d82895f09195b0a9

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 9097a53f65cbd82a868b54dda97032646e8c185a96cb6a4447dbb140458b5f60

kernel-debug-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 105ef6faa1a85c5687fd5a11a043daebc1f8551ee3b67bbf87e37901d259d7a4

kernel-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: b281b0081e50e420cf47f1b601c12cbf4d558aedb50210fb7656ba615bcd9ded

kernel-debuginfo-common-aarch64-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 31916256b0d82842ff4cb217d7e50560dfc92e0f5a3edde1736ebcabf79a9d79

kernel-tools-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 1b690adab8c5cf304b2b8dd3951d2d81be3b009c90aefc578614d0176ddd0bcf

kernel-tools-libs-devel-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 6a13cd305592889938d3da0a0b9c211691d4a9596c34e26c0702820a352a5b0b

perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: eecea859ba3faa6338cdda9ecb75af68dfdb70b65157c3d3e11113c6ceeb82ff

python3-perf-debuginfo-4.18.0-372.41.1.el8_6.aarch64.rpm

SHA-256: 97354a1ddb98349d8b898decec8e9e2d7587837e9e0ea6c4adf55c1938cd36ec

Related news

CVE-2023-43074: DSA-2023-141: Dell Unity, Unity VSA and Unity XT Security Update for Multiple Vulnerability

Dell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.

Ubuntu Security Notice USN-6221-1

Ubuntu Security Notice 6221-1 - It was discovered that a race condition existed in the overlay file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service. It was discovered that the virtual terminal device implementation in the Linux kernel contained a race condition in its ioctl handling that led to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-6124-1

Ubuntu Security Notice 6124-1 - Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service.

Ubuntu Security Notice USN-6089-1

Ubuntu Security Notice 6089-1 - It was discovered that the Intel i915 graphics driver in the Linux kernel did not perform a GPU TLB flush in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-6000-1

Ubuntu Security Notice 6000-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5951-1

Ubuntu Security Notice 5951-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5938-1

Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5934-1

Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5917-1

Ubuntu Security Notice 5917-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5883-1

Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0859-01

Red Hat Security Advisory 2023-0859-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include code execution and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-0794-01

Red Hat Security Advisory 2023-0794-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:0794: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates

Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload i...

Ubuntu Security Notice USN-5865-1

Ubuntu Security Notice 5865-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.

Ubuntu Security Notice USN-5854-1

Ubuntu Security Notice 5854-1 - It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information.

Red Hat Security Advisory 2023-0536-01

Red Hat Security Advisory 2023-0536-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0526-01

Red Hat Security Advisory 2023-0526-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

RHSA-2023:0531: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0536: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0496: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2022-4139: Invalid Bug ID

An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.

RHSA-2023:0441: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0348: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-43945: kernel: nfsd buffer overflow by RPC message over TCP with garbage data

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0334: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...

Red Hat Security Advisory 2023-0114-01

Red Hat Security Advisory 2023-0114-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2023-0123-01

Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0101-01

Red Hat Security Advisory 2023-0101-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0123: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0114: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Red Hat Security Advisory 2022-8973-01

Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-8974-01

Red Hat Security Advisory 2022-8974-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, code execution, out of bounds write, and privilege escalation vulnerabilities.

RHSA-2022:8973: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi-co...

RHSA-2022:8974: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...

Red Hat Security Advisory 2022-7933-01

Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:7933: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...

RHSA-2022:7683: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...

RHSA-2022:7444: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large argume...

CVE-2022-43449: en/security-disclosure/2022/2022-11.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.

Red Hat Security Advisory 2022-7338-01

Red Hat Security Advisory 2022-7338-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, privilege escalation, and use-after-free vulnerabilities.