Headline
RHSA-2022:8685: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- KVM: cmpxchg_gpte can write to pfns outside the userspace region (CVE-2022-1158)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- E810-XXV - Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117027)
- kernel BUG at kernel/sched/deadline.c:1561! [rhel-8.4.0] (BZ#2125673)
- zfcp: fix missing auto port scan and thus missing target ports (BZ#2127851)
- memory leak in vxlan_xmit_one (BZ#2131256)
- nf_conntrack causing nfs to stall (BZ#2134090)
- s390x: bpftrace Could not read symbols from /sys/kernel/debug/tracing/available_filter_functions: No such device (BZ#2134809)
- Intel E810 PTP clock glitching (BZ#2136038)
- configure link-down-on-close on and change interface mtu to 9000,the interface can’t up (BZ#2136218)
- dump additional CSRs for Tx hang debugging (BZ#2136515)
- system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137272)
- arp replies not making it to switch (BZ#2137521)
- WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138956)
- Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139582)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2069793 - CVE-2022-1158 kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
x86_64
bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676
bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95
kernel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604
kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f
kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633
kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769
kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0
kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92
kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d
kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc
kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598
kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366
kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87
kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df
kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae
perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160
perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e
python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
x86_64
bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676
bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95
kernel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604
kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f
kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633
kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769
kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0
kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92
kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d
kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc
kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598
kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366
kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87
kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df
kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae
perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160
perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e
python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
s390x
bpftool-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: e39c8ae2c9c83016f7e35da274b40396e52d80318e8cfe755734685f17d24f94
bpftool-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: c9237dd9909acfbfc23df521113007ee1e6704f1500a7ca16cd5e25934f7fbe2
kernel-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: fba8a4108c760a8aab5c72f76d0286275283d902a5d17ce3cc3424a597754ab3
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: c1ebb6ec854b52fbd2e5af8f1c77f516cff5a940fc5d8e5d4a7d44ded94eb781
kernel-cross-headers-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 61fa92156d716650aa81c9d1d4953c8fa9765fe19c5255c1c9d266f971c9ba5f
kernel-debug-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: db77aed879c80b73e90744974c75846f0ba9390d5e1d2a342198ab6019a936a7
kernel-debug-core-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 680644fc1f4f6301b43e146b1f4d55da9b4018518b362d1fc59c3a2e10d4c14e
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 0d9677439e8b25d56de234e1e6a3e9e5214f96eebe72f106d27c6021712116f5
kernel-debug-devel-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: aa5d6c32e5cbe782ccccfc21d942d00471cd75444f11a9b9b12ddb18c4ce88e6
kernel-debug-modules-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: ac3a7aa448dc91c79a07cce448396d89a0a6654578bd29c1199d1fa7be080d02
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: a825a5a220dc556caff03c2247839689b93f7e17fd2c16257e6f0e692b72fb28
kernel-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 0532e3a8e7672513d6997f82457a9ea7fbe1b83ea16ef06448873ef8a1f877d9
kernel-debuginfo-common-s390x-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: c4c35d26ce3728b99bcf6857b8226510f27c4861bdfc98faec0412c2f7a0d247
kernel-devel-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 6a9c761a29b440cbeb023cb37fd4a2e5f1e71a93e5737db2f2ed8a626594c925
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 23d24790b779ed4386adc31d171067c019e4d2c94e5e6d32b44f5624b2f66a96
kernel-modules-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 69d51131c14273548e5d0107276b4a40bd03539cdab19d6a150a4f9d96477697
kernel-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 2575595f6f6f05dbc42e7b14814d65e56ab3901ffa1c14024df8a05537464d44
kernel-tools-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: c86edcbeffdf44f481aa19912421e290d3a408ba06b9829e003699b5cc504900
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 6c9817d18022eabea25ce6c2d36698a2c35c0929fcbed8ea520eb5f8eedeb1c4
kernel-zfcpdump-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 9d30840c962c628c3053251c78e0ce93b844651d3f920c482ac23a66eef3abb1
kernel-zfcpdump-core-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: d6dd4fd29042a5f67a0b1a178766f17f6d1c3b91e8bd59b15be10b3c622f1d2b
kernel-zfcpdump-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 51ed53f915429446df4f73907ffa68ceb837642bf3ee729fe9410cd0e4964d67
kernel-zfcpdump-devel-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 52ac02902169bc0ccdb0086ada8f345947437d61fc961fdd85183e06486f4334
kernel-zfcpdump-modules-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 5b147ab4af4d73e678401c08fc1297f301ba23fa9e4734f12fb266e834a4d2b2
kernel-zfcpdump-modules-extra-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: c5aaa140a2ab4e1befc3dec404b93d9ec69f113a1a4f6637746bf2b34aa84e6b
perf-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 87b96b6a814e359c136f28cb3f9624336db0800a37fa8a170fef7b5433b3e38d
perf-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 3e00ac9b9ca572fa8f4491bd2155b59727c5bf76f5bd43aa95c52076c317b45d
python3-perf-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: e7bf2c2f9842c302744c875343f70de3821a8fdb3b7648285f4f5db33b3075ef
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.s390x.rpm
SHA-256: 944d041a8993e420af667b452351acbce6d3be9a3436b5008db409edba58b001
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
ppc64le
bpftool-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 7ebb5cadf1a96fd2d8f2ce427def0ed6b7edb0fa3b23d900846139c53db74fb9
bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4
kernel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 44cb88bdfa1f805d5df65c316ca5c156d29a44c1c56b51b30504598494202bb1
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 4738990320c3c850ebf9b878848fb88af4898c2214e1d145d08b067d677f49ff
kernel-cross-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: f768b421de5648cfbe8ca145f31996edfebe52b45511afa017dfd0dbeac4af23
kernel-debug-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 001393efe12fe5cef0b70697ecb01db7a53b0fca219191d88b6e876e68e4cc8d
kernel-debug-core-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: a46b7dfa69f8eda15ba526363256c806ca93231e85630a033c261aabd0e26e09
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718
kernel-debug-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: da59c11ec56c0500c807fdcc7ee0483d7402d8ba5912acffed588e0018fe3d86
kernel-debug-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 3844e85dd243f7a370887f7e28dbe9fcb63a90fb2cf0f1590996646ea10907a7
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 5fd17cd3119eeb0af1f58c8a5a7920973396893b03dfece27c48763f23035788
kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6
kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645
kernel-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 5ce10ce90cd15d52ddcd713cca93beddc716079769269d07a779bd4188a56412
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 67acb29f8ade7a514882eecce4a24f05ad5df34cde574e1c7e75f7bbef99b38e
kernel-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: cf2029870346185c7eaac68f0ff5a23ba1756af579a025c1157d3bd4b4e8dc1e
kernel-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: e4e178b613dc7bea7bdae17e223edfae4d668bd646361d46898005e1294b3f42
kernel-tools-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: ac06d0b81c42f9e4d6c93735931fa8bdcea8792e0125ca87c5b0d8dc79bbbc8c
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e
kernel-tools-libs-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 265bf7859b19344cf58b4c3ff827224acc617efb2da857809a45df4144780645
perf-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 81f14634a0ef41403602ef1ab755d64b7420aa4051a60ac67517512f4defd788
perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f
python3-perf-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 71e3a75d349029b5f539bd6d11ea87d1255c8bdab97f6e0f171750fa400d55fa
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
x86_64
bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676
bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95
kernel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604
kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f
kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633
kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769
kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0
kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92
kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d
kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc
kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598
kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366
kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87
kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df
kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae
perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160
perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e
python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
aarch64
bpftool-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 9e07bb73d7fb8c9cfa7da65e5bb7153c9f5db13a49b191142b9f8eeb23627fe0
bpftool-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: ce6bd6bf659a73861312a8175351220180af4e7214af80ea0d76b5f98f3f6453
kernel-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 2ffcf4afda60841eb952562b91426c7a40962bba5f19e7922214e82c19307686
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: f6a3a7a97bb48664d909d2b9b14a876003dfea8c9832885a2673537795046a3f
kernel-cross-headers-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 467c7511c9b8a4b80faf1eecb7a6d3a061d14b79480572ada6a0d02148fabf77
kernel-debug-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 0bcc977a4c739221354555b29087730400949ee24602f90e1a13bc9cf05e3d4b
kernel-debug-core-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 0364566e7bd0822cb14add474dd17d28679fd59a6af03643df1d18ae3849aee8
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: d6800fd69593ddfb266fb9b007b8c7d1f1dc6b853cb1debaaefbb87dbf8b51b8
kernel-debug-devel-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 9a9df0515981093f8a977e77d78666c5d8fbdd4c415db70ca100ee7f5e3d8262
kernel-debug-modules-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: dda9a09ead9a8a238540d27b24c19589160349e72b64f0c6ebfa583fdd413f2b
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 74dd832d6e8f4e00a70878fd4cefd659db932c9a1a7fc3096367cd0594a6a00c
kernel-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 32df6d3651d651b4aa302ae1dafec299da5507f1fddae059c0e13e7fb1d1c8d5
kernel-debuginfo-common-aarch64-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: a66a1bc7493d81caa7a2b9391659f2615c7c9efdf83965ad520427b76177233e
kernel-devel-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 5f063d1760249e6866c28a74d84412800a171153fee110da93a5d0be6d01e4ff
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: f8c25d7bac41e348f1516b032ba826d53c28ac3b02b12ace8e53b68c2de58a55
kernel-modules-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 14b7ef1fc256fd4ce9af994028418b0de9c2ebd526f7bfe5f097f83157578b52
kernel-modules-extra-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 6034cb7dd965528a40e65a9f2686e36daa26a155f1b0cb481e0b2a437e89a042
kernel-tools-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: f9cd8b0def71fd30cddc057ce8d58436b1f92e77d77dcbd946ad4277fe18c6f6
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: ad08a47045e4175d00684076d1e156e62e51f4a69ccc1797bd3eeda4b672cb1d
kernel-tools-libs-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: f718ed7a2fd1e4a9723702c5661848fc0a590a23a77b49630d0a1a72ed5e009f
perf-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: bcebbf5a40d6f13646f821fc36de878b739d76fa27410c5080327fc92db62521
perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 2bda45ca3f416b5288771a77f7f437a7dd1b30f0803e663485fa0667b94fe4c3
python3-perf-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 3aed6fe7bdab8d3a12329cb5f7c6d3a7ab9c08fe941cba5687e3ee4f3c72b05a
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 9f086d9bbd10c68189cd1b441d80fc49a5a9227ae093c80ef9979aad5008b299
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
ppc64le
bpftool-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 7ebb5cadf1a96fd2d8f2ce427def0ed6b7edb0fa3b23d900846139c53db74fb9
bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4
kernel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 44cb88bdfa1f805d5df65c316ca5c156d29a44c1c56b51b30504598494202bb1
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 4738990320c3c850ebf9b878848fb88af4898c2214e1d145d08b067d677f49ff
kernel-cross-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: f768b421de5648cfbe8ca145f31996edfebe52b45511afa017dfd0dbeac4af23
kernel-debug-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 001393efe12fe5cef0b70697ecb01db7a53b0fca219191d88b6e876e68e4cc8d
kernel-debug-core-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: a46b7dfa69f8eda15ba526363256c806ca93231e85630a033c261aabd0e26e09
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718
kernel-debug-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: da59c11ec56c0500c807fdcc7ee0483d7402d8ba5912acffed588e0018fe3d86
kernel-debug-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 3844e85dd243f7a370887f7e28dbe9fcb63a90fb2cf0f1590996646ea10907a7
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 5fd17cd3119eeb0af1f58c8a5a7920973396893b03dfece27c48763f23035788
kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6
kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645
kernel-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 5ce10ce90cd15d52ddcd713cca93beddc716079769269d07a779bd4188a56412
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 67acb29f8ade7a514882eecce4a24f05ad5df34cde574e1c7e75f7bbef99b38e
kernel-modules-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: cf2029870346185c7eaac68f0ff5a23ba1756af579a025c1157d3bd4b4e8dc1e
kernel-modules-extra-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: e4e178b613dc7bea7bdae17e223edfae4d668bd646361d46898005e1294b3f42
kernel-tools-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: ac06d0b81c42f9e4d6c93735931fa8bdcea8792e0125ca87c5b0d8dc79bbbc8c
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e
kernel-tools-libs-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 265bf7859b19344cf58b4c3ff827224acc617efb2da857809a45df4144780645
perf-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 81f14634a0ef41403602ef1ab755d64b7420aa4051a60ac67517512f4defd788
perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f
python3-perf-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 71e3a75d349029b5f539bd6d11ea87d1255c8bdab97f6e0f171750fa400d55fa
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.71.1.el8_4.src.rpm
SHA-256: 9f6e592362c068f5335d2a4e1cc958b4ce3bd24335e172b0c2d7ead3303ef18e
x86_64
bpftool-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 075379f544fd2063179e089481f411d11e069b6c25ed71c16139583046b36676
bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95
kernel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 43178e09646764eddb9730a21fe60ed02a50b8cc8b7211f15e8978f732eda4e9
kernel-abi-stablelists-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: 7d47099c87dea66ee4331c542acb9822a609d0a3782b8eab03775548122670d1
kernel-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9ead0580a189a5595b534b0620adcf5d093c0b37813abe7939f4185bddc4604
kernel-cross-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 664bd37e953cf9a23772ee776f5bc094e18339ea0b73a5edbf8231bb0c2c741f
kernel-debug-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ea70ac30f1866a73c4c6fcdc8cf848f1415ae692a22ad10d4e56d16ef5a7f633
kernel-debug-core-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f8fcb4d269e6c6bc11d82e0858ff46a7d548de5de25f153dac92e671037a945
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769
kernel-debug-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 28ab621cf9e05868d8bcc426bdd243b87a3f7a4c3294693f3d4dd02daa7254a0
kernel-debug-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 422b0968ebc0751987d66fd16b8281d6e920643b28e5c15f7b44df679e611cac
kernel-debug-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 0f10d3c258d41de4c7a4f4b2e3b188ec2bdaa20051255602150b031a7a385b92
kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d
kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc
kernel-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: f9922ae65faccba971db6cb2b97a2f9dbb77016a3c813ef6b323560b6e275060
kernel-doc-4.18.0-305.71.1.el8_4.noarch.rpm
SHA-256: a09740ba084127e713f1bc9d49d19a1000144fcd4420b929d0906cee0a7e5926
kernel-headers-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 9a3a8985efdc655aa2d4568f125813b56c517261cc99f4f71ca95596938a7598
kernel-modules-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: ccffa0c3520673dfccecf683d8f16ccdc99b953662fcea7ac95bab19149d5366
kernel-modules-extra-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 26b575410f8c2bb85b5cec7bd4ab3fe4bfc7aa51e1df432702d59163a18c9a87
kernel-tools-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 2502979ce118517ff9c560b239ea5cc186021863f4a387eb65c2f61311720741
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df
kernel-tools-libs-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 1c9de4cde85071d38103c8f35a5233888a2c60196507fc3cdfbdd6754e6e39ae
perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 444698f06319de03d10ef9124c1a85a569927715e6f25dff9286368b302d6160
perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e
python3-perf-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: c4213cece2dd635c425a95f013a962184f351c265e24cb907b37ba59cf87f4d3
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 61f08033e466c675d6374b42dfeeef7eb2e3984dd94fb2e4513a2acf7a6d3c95
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: dcdec982453ed613794a763d99864c8a8c44176efcc4878a3a00b1cbb3753769
kernel-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 8a4b25ca00783378a9d2956cf6d4db35d75f73af4b3fda9b32ea03531ab17a2d
kernel-debuginfo-common-x86_64-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 29dd1fcc4d83fbb7bb1772463057a355e8cb9586c78417785075ae0677dcebcc
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 91cf7697620cf396cb8ba31ec48c64c724b76dad5bb73d3bc7d4ba6cca1612df
kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: b3e70c85da20eb14e32a17f490d534a473546a84f519757ec0981f13f8807287
perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 49168c6b0b842ffb5c5b2f6b6c32829515f567baa440fdf689208e90e79a280e
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.x86_64.rpm
SHA-256: 053e8d6b12e8ffb243c5027be6bd01e20fb1cc612ae7571aac231a64edace293
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 521ae3b8b35b2315097e7035ee73f86a994dea30f6580a138b1e73d7502221e4
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: d708d1a0e818c6f9d54d9519987ae25e1df0072201264563396bb384c333e718
kernel-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 66d12b0f1615b05d7d375588991981e0b4d783ebeac0cf588c4ab74e3de2b4e6
kernel-debuginfo-common-ppc64le-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 1638aed2fd8e17337c231e7b36bbfd1b5272b95b4159d5d6bd5b50883ba3d645
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 354d23b0a10841d3f2135fdb404bf39b12d04c6459df5f3f56814fef633eaa6e
kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 3b9cfdf6d77ae325d6cd100d5613eff0b04ba2fb5b43a53c8a782c396e470dac
perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 9195a1fba1bd37196c2f5319a604ebe12ed9a07d1e0853305bd2f9593ab3d83f
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.ppc64le.rpm
SHA-256: 271459ebb7972300d6ef55888ad8f74568440a54df187c733f043cc800bd769a
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: ce6bd6bf659a73861312a8175351220180af4e7214af80ea0d76b5f98f3f6453
kernel-debug-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: d6800fd69593ddfb266fb9b007b8c7d1f1dc6b853cb1debaaefbb87dbf8b51b8
kernel-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 32df6d3651d651b4aa302ae1dafec299da5507f1fddae059c0e13e7fb1d1c8d5
kernel-debuginfo-common-aarch64-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: a66a1bc7493d81caa7a2b9391659f2615c7c9efdf83965ad520427b76177233e
kernel-tools-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: ad08a47045e4175d00684076d1e156e62e51f4a69ccc1797bd3eeda4b672cb1d
kernel-tools-libs-devel-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 4a8231c2082c5e71951cc99e131a65b6acc4caa7b4d5b097ee5ecdc4cdbad7c3
perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 2bda45ca3f416b5288771a77f7f437a7dd1b30f0803e663485fa0667b94fe4c3
python3-perf-debuginfo-4.18.0-305.71.1.el8_4.aarch64.rpm
SHA-256: 9f086d9bbd10c68189cd1b441d80fc49a5a9227ae093c80ef9979aad5008b299
Related news
Red Hat Security Advisory 2022-8893-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.20.
Red Hat OpenShift Container Platform release 4.11.20 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: golang: crash in a golang.org/x/crypto/ssh server
Red Hat Security Advisory 2022-8989-01 - The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8974-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, code execution, out of bounds write, and privilege escalation vulnerabilities.
Red Hat Security Advisory 2022-8941-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8940-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Advisory 2022-8673-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2022-8686-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2022-8685-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5468-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5467-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5416-1 - Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. A local attacker could possibly use this to cause a denial of service.