Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8685: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
Red Hat Security Data
#vulnerability#linux#red_hat#intel#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • E810-XXV - Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117027)
  • kernel BUG at kernel/sched/deadline.c:1561! [rhel-8.4.0] (BZ#2125673)
  • zfcp: fix missing auto port scan and thus missing target ports (BZ#2127851)
  • memory leak in vxlan_xmit_one (BZ#2131256)
  • nf_conntrack causing nfs to stall (BZ#2134090)
  • s390x: bpftrace Could not read symbols from /sys/kernel/debug/tracing/available_filter_functions: No such device (BZ#2134809)
  • Intel E810 PTP clock glitching (BZ#2136038)
  • configure link-down-on-close on and change interface mtu to 9000,the interface can’t up (BZ#2136218)
  • dump additional CSRs for Tx hang debugging (BZ#2136515)
  • system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137272)
  • arp replies not making it to switch (BZ#2137521)
  • WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138956)
  • Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139582)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2069793 - CVE-2022-1158 kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

x86_64

bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676

bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95

kernel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604

kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f

kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633

kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769

kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0

kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92

kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d

kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc

kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598

kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366

kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87

kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df

kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae

perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160

perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e

python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

x86_64

bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676

bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95

kernel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604

kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f

kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633

kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769

kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0

kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92

kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d

kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc

kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598

kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366

kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87

kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df

kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae

perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160

perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e

python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

s390x

bpftool-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: e39c8ae2c9c83016f7e35da274b40396e52d80318e8cfe755734685f17d24f94

bpftool-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: c9237dd9909acfbfc23df521113007ee1e6704f1500a7ca16cd5e25934f7fbe2

kernel-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: fba8a4108c760a8aab5c72f76d0286275283d902a5d17ce3cc3424a597754ab3

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: c1ebb6ec854b52fbd2e5af8f1c77f516cff5a940fc5d8e5d4a7d44ded94eb781

kernel-cross-headers-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 61fa92156d716650aa81c9d1d4953c8fa9765fe19c5255c1c9d266f971c9ba5f

kernel-debug-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: db77aed879c80b73e90744974c75846f0ba9390d5e1d2a342198ab6019a936a7

kernel-debug-core-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 680644fc1f4f6301b43e146b1f4d55da9b4018518b362d1fc59c3a2e10d4c14e

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 0d9677439e8b25d56de234e1e6a3e9e5214f96eebe72f106d27c6021712116f5

kernel-debug-devel-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: aa5d6c32e5cbe782ccccfc21d942d00471cd75444f11a9b9b12ddb18c4ce88e6

kernel-debug-modules-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: ac3a7aa448dc91c79a07cce448396d89a0a6654578bd29c1199d1fa7be080d02

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: a825a5a220dc556caff03c2247839689b93f7e17fd2c16257e6f0e692b72fb28

kernel-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 0532e3a8e7672513d6997f82457a9ea7fbe1b83ea16ef06448873ef8a1f877d9

kernel-debuginfo-common-s390x-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: c4c35d26ce3728b99bcf6857b8226510f27c4861bdfc98faec0412c2f7a0d247

kernel-devel-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 6a9c761a29b440cbeb023cb37fd4a2e5f1e71a93e5737db2f2ed8a626594c925

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 23d24790b779ed4386adc31d171067c019e4d2c94e5e6d32b44f5624b2f66a96

kernel-modules-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 69d51131c14273548e5d0107276b4a40bd03539cdab19d6a150a4f9d96477697

kernel-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 2575595f6f6f05dbc42e7b14814d65e56ab3901ffa1c14024df8a05537464d44

kernel-tools-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: c86edcbeffdf44f481aa19912421e290d3a408ba06b9829e003699b5cc504900

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 6c9817d18022eabea25ce6c2d36698a2c35c0929fcbed8ea520eb5f8eedeb1c4

kernel-zfcpdump-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 9d30840c962c628c3053251c78e0ce93b844651d3f920c482ac23a66eef3abb1

kernel-zfcpdump-core-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: d6dd4fd29042a5f67a0b1a178766f17f6d1c3b91e8bd59b15be10b3c622f1d2b

kernel-zfcpdump-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 51ed53f915429446df4f73907ffa68ceb837642bf3ee729fe9410cd0e4964d67

kernel-zfcpdump-devel-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 52ac02902169bc0ccdb0086ada8f345947437d61fc961fdd85183e06486f4334

kernel-zfcpdump-modules-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 5b147ab4af4d73e678401c08fc1297f301ba23fa9e4734f12fb266e834a4d2b2

kernel-zfcpdump-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: c5aaa140a2ab4e1befc3dec404b93d9ec69f113a1a4f6637746bf2b34aa84e6b

perf-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 87b96b6a814e359c136f28cb3f9624336db0800a37fa8a170fef7b5433b3e38d

perf-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 3e00ac9b9ca572fa8f4491bd2155b59727c5bf76f5bd43aa95c52076c317b45d

python3-perf-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: e7bf2c2f9842c302744c875343f70de3821a8fdb3b7648285f4f5db33b3075ef

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm

SHA-256: 944d041a8993e420af667b452351acbce6d3be9a3436b5008db409edba58b001

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

ppc64le

bpftool-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 7ebb5cadf1a96fd2d8f2ce427def0ed6b7edb0fa3b23d900846139c53db74fb9

bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4

kernel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 44cb88bdfa1f805d5df65c316ca5c156d29a44c1c56b51b30504598494202bb1

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 4738990320c3c850ebf9b878848fb88af4898c2214e1d145d08b067d677f49ff

kernel-cross-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: f768b421de5648cfbe8ca145f31996edfebe52b45511afa017dfd0dbeac4af23

kernel-debug-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 001393efe12fe5cef0b70697ecb01db7a53b0fca219191d88b6e876e68e4cc8d

kernel-debug-core-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: a46b7dfa69f8eda15ba526363256c806ca93231e85630a033c261aabd0e26e09

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718

kernel-debug-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: da59c11ec56c0500c807fdcc7ee0483d7402d8ba5912acffed588e0018fe3d86

kernel-debug-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 3844e85dd243f7a370887f7e28dbe9fcb63a90fb2cf0f1590996646ea10907a7

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 5fd17cd3119eeb0af1f58c8a5a7920973396893b03dfece27c48763f23035788

kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6

kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645

kernel-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 5ce10ce90cd15d52ddcd713cca93beddc716079769269d07a779bd4188a56412

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 67acb29f8ade7a514882eecce4a24f05ad5df34cde574e1c7e75f7bbef99b38e

kernel-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: cf2029870346185c7eaac68f0ff5a23ba1756af579a025c1157d3bd4b4e8dc1e

kernel-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: e4e178b613dc7bea7bdae17e223edfae4d668bd646361d46898005e1294b3f42

kernel-tools-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: ac06d0b81c42f9e4d6c93735931fa8bdcea8792e0125ca87c5b0d8dc79bbbc8c

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e

kernel-tools-libs-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 265bf7859b19344cf58b4c3ff827224acc617efb2da857809a45df4144780645

perf-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 81f14634a0ef41403602ef1ab755d64b7420aa4051a60ac67517512f4defd788

perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f

python3-perf-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 71e3a75d349029b5f539bd6d11ea87d1255c8bdab97f6e0f171750fa400d55fa

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

x86_64

bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676

bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95

kernel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604

kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f

kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633

kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769

kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0

kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92

kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d

kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc

kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598

kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366

kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87

kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df

kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae

perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160

perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e

python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

aarch64

bpftool-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 9e07bb73d7fb8c9cfa7da65e5bb7153c9f5db13a49b191142b9f8eeb23627fe0

bpftool-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: ce6bd6bf659a73861312a8175351220180af4e7214af80ea0d76b5f98f3f6453

kernel-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 2ffcf4afda60841eb952562b91426c7a40962bba5f19e7922214e82c19307686

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: f6a3a7a97bb48664d909d2b9b14a876003dfea8c9832885a2673537795046a3f

kernel-cross-headers-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 467c7511c9b8a4b80faf1eecb7a6d3a061d14b79480572ada6a0d02148fabf77

kernel-debug-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 0bcc977a4c739221354555b29087730400949ee24602f90e1a13bc9cf05e3d4b

kernel-debug-core-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 0364566e7bd0822cb14add474dd17d28679fd59a6af03643df1d18ae3849aee8

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: d6800fd69593ddfb266fb9b007b8c7d1f1dc6b853cb1debaaefbb87dbf8b51b8

kernel-debug-devel-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 9a9df0515981093f8a977e77d78666c5d8fbdd4c415db70ca100ee7f5e3d8262

kernel-debug-modules-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: dda9a09ead9a8a238540d27b24c19589160349e72b64f0c6ebfa583fdd413f2b

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 74dd832d6e8f4e00a70878fd4cefd659db932c9a1a7fc3096367cd0594a6a00c

kernel-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 32df6d3651d651b4aa302ae1dafec299da5507f1fddae059c0e13e7fb1d1c8d5

kernel-debuginfo-common-aarch64-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: a66a1bc7493d81caa7a2b9391659f2615c7c9efdf83965ad520427b76177233e

kernel-devel-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 5f063d1760249e6866c28a74d84412800a171153fee110da93a5d0be6d01e4ff

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: f8c25d7bac41e348f1516b032ba826d53c28ac3b02b12ace8e53b68c2de58a55

kernel-modules-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 14b7ef1fc256fd4ce9af994028418b0de9c2ebd526f7bfe5f097f83157578b52

kernel-modules-extra-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 6034cb7dd965528a40e65a9f2686e36daa26a155f1b0cb481e0b2a437e89a042

kernel-tools-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: f9cd8b0def71fd30cddc057ce8d58436b1f92e77d77dcbd946ad4277fe18c6f6

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: ad08a47045e4175d00684076d1e156e62e51f4a69ccc1797bd3eeda4b672cb1d

kernel-tools-libs-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: f718ed7a2fd1e4a9723702c5661848fc0a590a23a77b49630d0a1a72ed5e009f

perf-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: bcebbf5a40d6f13646f821fc36de878b739d76fa27410c5080327fc92db62521

perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 2bda45ca3f416b5288771a77f7f437a7dd1b30f0803e663485fa0667b94fe4c3

python3-perf-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 3aed6fe7bdab8d3a12329cb5f7c6d3a7ab9c08fe941cba5687e3ee4f3c72b05a

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 9f086d9bbd10c68189cd1b441d80fc49a5a9227ae093c80ef9979aad5008b299

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

ppc64le

bpftool-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 7ebb5cadf1a96fd2d8f2ce427def0ed6b7edb0fa3b23d900846139c53db74fb9

bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4

kernel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 44cb88bdfa1f805d5df65c316ca5c156d29a44c1c56b51b30504598494202bb1

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 4738990320c3c850ebf9b878848fb88af4898c2214e1d145d08b067d677f49ff

kernel-cross-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: f768b421de5648cfbe8ca145f31996edfebe52b45511afa017dfd0dbeac4af23

kernel-debug-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 001393efe12fe5cef0b70697ecb01db7a53b0fca219191d88b6e876e68e4cc8d

kernel-debug-core-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: a46b7dfa69f8eda15ba526363256c806ca93231e85630a033c261aabd0e26e09

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718

kernel-debug-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: da59c11ec56c0500c807fdcc7ee0483d7402d8ba5912acffed588e0018fe3d86

kernel-debug-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 3844e85dd243f7a370887f7e28dbe9fcb63a90fb2cf0f1590996646ea10907a7

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 5fd17cd3119eeb0af1f58c8a5a7920973396893b03dfece27c48763f23035788

kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6

kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645

kernel-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 5ce10ce90cd15d52ddcd713cca93beddc716079769269d07a779bd4188a56412

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 67acb29f8ade7a514882eecce4a24f05ad5df34cde574e1c7e75f7bbef99b38e

kernel-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: cf2029870346185c7eaac68f0ff5a23ba1756af579a025c1157d3bd4b4e8dc1e

kernel-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: e4e178b613dc7bea7bdae17e223edfae4d668bd646361d46898005e1294b3f42

kernel-tools-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: ac06d0b81c42f9e4d6c93735931fa8bdcea8792e0125ca87c5b0d8dc79bbbc8c

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e

kernel-tools-libs-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 265bf7859b19344cf58b4c3ff827224acc617efb2da857809a45df4144780645

perf-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 81f14634a0ef41403602ef1ab755d64b7420aa4051a60ac67517512f4defd788

perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f

python3-perf-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 71e3a75d349029b5f539bd6d11ea87d1255c8bdab97f6e0f171750fa400d55fa

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.71.1.el8_4.src.rpm

SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e

x86_64

bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676

bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95

kernel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9

kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1

kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604

kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f

kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633

kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769

kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0

kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac

kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92

kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d

kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc

kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060

kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm

SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926

kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598

kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366

kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87

kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df

kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae

perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160

perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e

python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769

kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d

kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df

kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: b3e70c85da20eb14e32a17f490d534a473546a84f519757ec0981f13f8807287

perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm

SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718

kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6

kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e

kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 3b9cfdf6d77ae325d6cd100d5613eff0b04ba2fb5b43a53c8a782c396e470dac

perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm

SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: ce6bd6bf659a73861312a8175351220180af4e7214af80ea0d76b5f98f3f6453

kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: d6800fd69593ddfb266fb9b007b8c7d1f1dc6b853cb1debaaefbb87dbf8b51b8

kernel-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 32df6d3651d651b4aa302ae1dafec299da5507f1fddae059c0e13e7fb1d1c8d5

kernel-debuginfo-common-aarch64-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: a66a1bc7493d81caa7a2b9391659f2615c7c9efdf83965ad520427b76177233e

kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: ad08a47045e4175d00684076d1e156e62e51f4a69ccc1797bd3eeda4b672cb1d

kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 4a8231c2082c5e71951cc99e131a65b6acc4caa7b4d5b097ee5ecdc4cdbad7c3

perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 2bda45ca3f416b5288771a77f7f437a7dd1b30f0803e663485fa0667b94fe4c3

python3-perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm

SHA-256: 9f086d9bbd10c68189cd1b441d80fc49a5a9227ae093c80ef9979aad5008b299

Related news

Red Hat Security Advisory 2022-8893-01

Red Hat Security Advisory 2022-8893-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.20.

RHSA-2022:8893: Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update

Red Hat OpenShift Container Platform release 4.11.20 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server

Red Hat Security Advisory 2022-8989-01

Red Hat Security Advisory 2022-8989-01 - The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8974-01

Red Hat Security Advisory 2022-8974-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, code execution, out of bounds write, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-8941-01

Red Hat Security Advisory 2022-8941-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8940-01

Red Hat Security Advisory 2022-8940-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8974: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...

RHSA-2022:8941: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8940: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-8809-01

Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8831: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8809: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-8673-01

Red Hat Security Advisory 2022-8673-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2022-8686-01

Red Hat Security Advisory 2022-8686-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2022-8685-01

Red Hat Security Advisory 2022-8685-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability.

RHSA-2022:8673: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

RHSA-2022:8686: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region

CVE-2022-1158: Invalid Bug ID

A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5468-1

Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5467-1

Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5416-1

Ubuntu Security Notice 5416-1 - Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service.