Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:8767: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL8.6: Backport upstream migrate_disable for PREEMPT_RT support (BZ#2140304)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

x86_64

bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b

bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2

kernel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d

kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364

kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20

kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec

kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819

kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd

kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e

kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2

kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46

kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44

kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179

kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689

kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f

perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055

perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30

python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

x86_64

bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b

bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2

kernel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d

kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364

kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20

kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec

kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819

kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd

kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e

kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2

kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46

kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44

kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179

kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689

kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f

perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055

perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30

python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

s390x

bpftool-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 0971502926b623fec9af36fbbe16d2fda6b109488c6f63f93e55d9bfe113a8a2

bpftool-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: aa91ce73a6e2e528a544c9be15ea5c801474502e0778824caa4b7ee34140fd3b

kernel-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 91138588d16cd2f3b90a31aad572ed42bebbfb6c24b5c0c60256125f4da30f08

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: a61264697346268089af985e4b983ff8592fcd715198de53a401027f3780c2c7

kernel-cross-headers-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 32ad633bca2e17562229fbd10e0f56ce645922ba9a6aa326193602d68ab9ad1c

kernel-debug-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: be9eb6201ebd541ae0fed762acacb5c3a845b7ae02a9c47b5b9a54f2da26072f

kernel-debug-core-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 34b50f44a7a3a1161d9e98eb220aeb384e5d30ee47d4861f4c388ceee72f2859

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 8be9a0d957e91cfb833519cf0ce8f40b7adf7b0d001c3ff89e644a74b977eddf

kernel-debug-devel-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: fc8a4f019f0345d444a9716197d7548037611c723517b497b608c2a5b3eff529

kernel-debug-modules-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 8d2107f56c60311228d76f805f44d3f81affa96bdda46f158e89714db7fbb33c

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: dabdeeccd597bd1f92598a8fb17e6ef5fe369952905fd6f31e8bec4779f4e12f

kernel-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: bd8cfff3de31df18a294191566549085ae0576e92315c5dd39bd1dd53fa105c8

kernel-debuginfo-common-s390x-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 3df12d7cd621fa8d63996989b446d84c755375b5f411820654a60213d14b64e1

kernel-devel-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: d1c8eee341b93ad2f26423ba5e38e26b5a10b683ba29cbb8c7888a70e855d6a6

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: d00e72a1b24535ecb7cbe542fe53cf81e044f06372e1724781e02bdb22649c51

kernel-modules-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: c33bf26e6387d02cbdb2179185d0819955e4524428126a0e1c0d54bc9c631860

kernel-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 5dbd5ef8151d096d9eb9ced278f81e8132a12a1de1a95a7cda9bfdc2bb19675f

kernel-tools-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 1340b62df490981cfe174367496d4cfe5dbc2013727559506a940c8e521e4f94

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 2af32cb6992ce45b849b42dba7caa5b68056006b9d7dc046ce3ec471f674211b

kernel-zfcpdump-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 6eeefe7ecbf878397c92fe7c6582a87217705827307223b7ea5db943b530b288

kernel-zfcpdump-core-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 339a2efc9bb53d06a1bf5886014238eb395725904e955d69b43b8018217bb31c

kernel-zfcpdump-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 4457ec8337d4108485a28ed40b1dd86fc409f4fc0ed905437df413932f172c09

kernel-zfcpdump-devel-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 8a0032ed0a7bdd94de81d43053aa27d8a1aee4e7da32f3882b27927e93b219a6

kernel-zfcpdump-modules-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 418cef4a8364c694a53a4b85158be21eced492e9e57fdc3763b8efe4bc285ae7

kernel-zfcpdump-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 9ebc200781974646e112f81e34c85202c092ec65117b127fe700e11b3558a045

perf-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 5daa45f3467d32894e485e3f7ab80aa8e3c71bc03c20481296dbb9abe14a997e

perf-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 20efdbab71e3d5b8c04245e2d206509b1047a24c6631de1515a4cdf54017bfbd

python3-perf-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 4dba47faef34427b35f438807ac55a2f11f2202082ab472a6d903079a268a814

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm

SHA-256: 26371f8add86c532caf27da033438c95b05d5cef9efaa202e59d4228b127c7e8

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

ppc64le

bpftool-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 1e330375dd80d50795f15875f197cc8116f71911756cf88de96c540e4f8b5f05

bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842

kernel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d031dcf88c1a1f406dfb18b3dfa07225037254188fbaedbe98d3740bc44b00df

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 38543d7def8912433fccc0d35bf163bdb00d7d66f866eb2b6234d09c24b7a737

kernel-cross-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4a9a5658151ed620ded526cd5a7e8257974605520d62ff5ec1025e99df1ac58d

kernel-debug-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 54ab013e11b93a9372669386c37be0460a94339cf6da2df3c3c1618a49981019

kernel-debug-core-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4959bac77b5188c3ad2bbae079109c2024d61c4ed60ca027afbf50c1417be707

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1

kernel-debug-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 38224820a52ed3b9b40afaf4d8dc8bc941041aca72d8c8e2032322fbf1642004

kernel-debug-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: b59892654eaf198082acdd76b0f78c9e3728dfea948451e31977360c815f849f

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: f473b17b483fd01e2eb0ddbe3955a32c2fd0bef70ce917ba30ac3b560f68fa87

kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36

kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c

kernel-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 84e2e4064c29f84d3c114242b23074114d0d6bbf0fcf74e63698c00572768dbb

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d0e68f6d29dc657194a5078628403a7c16f6bf9d8efd94f72268fc61b847181d

kernel-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 58c7dd6ac8acbc115cf4c22c901d29a50ef6ccd6187326d2eaf7548b3d152433

kernel-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4c0800563ffbda6a991316191800c6885031902d0c63587b5b20dc3ff2225a7e

kernel-tools-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: dcb22185fa2843036f0ec68f738be034c8a291a496e3cedd51794b06bf5464e2

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798

kernel-tools-libs-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: bcc263bc27b6bab70155359c334dc044fda2f5afd6e145ee3d71765c5e4f5f8c

perf-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 78916f8277342e9df9c32c0d3174476e47238c74e7db842aea81ef00a2193aac

perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9

python3-perf-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 360701a97c41647d637b59fab7556aac6ec86d4c043edcef2797a89577d1de64

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

x86_64

bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b

bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2

kernel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d

kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364

kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20

kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec

kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819

kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd

kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e

kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2

kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46

kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44

kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179

kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689

kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f

perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055

perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30

python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

aarch64

bpftool-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 06412b10552261542a1a37ce343c83741ecca12d7cef8e48d52107a07082e965

bpftool-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 5adb9d38f077b2b4b34f066a3398812f744a8af7bd9d513ebba08f858a2bdeb2

kernel-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 16cd65c0f4db544d8b6b7d3cabc1efd422714980c75cbb9b35760a3553e7ae51

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: fec8daff1f7d5b9162759cf2313918e585bb1a5983a1b0869af521500f2f5597

kernel-cross-headers-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: ca1d03ca5d64a17527bf238fd9562c3fe5257cc337bc1a07ad5b4dd4d219a351

kernel-debug-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 46f5a11d6a6e21f2d3daf9fd09a8b109943cd49604ee0ef7af9858d7e3d5f89a

kernel-debug-core-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 8f26858ed4031e3393c8b33d22b6ae9c2b42bb4af1ab5ee1c92a198f44495218

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 8048c48f55273c81f6018387832296d6df8fb44a3900cf0627ddef03bcca2dec

kernel-debug-devel-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 7a23cf747d31752dc6aff35043addf87aec68595339ef7a42c7f08101aad8380

kernel-debug-modules-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 5fb02fd6ccde08376529001337c60d53b10dacbcc866418dc01822693606dafb

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 053ac9c7fe9cf5433f8cf681fb09e345f3daeef5897aaef1d6a3bfc6941ed9ea

kernel-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: d11475e93ad6465d46ffd240e6e850766a372d7cf21618eddbd46104513569da

kernel-debuginfo-common-aarch64-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 0e37c0682d6bcadbc81467ec8462c509989d30179f3588a82dcf20f451db4748

kernel-devel-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: f5c3d13737049e06a97b3b390c0f6591da48d4f3b4ab306020dbeb05802aa82f

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: f009948b1330f3516c8326c03ee3bc1010a9a08639b263e9368d24371f1ad50b

kernel-modules-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 58eb933a45aca1de1665bbe5a3fe524608d8064d4d13d95750b061f6ff4a5ea1

kernel-modules-extra-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 7ffeb82615d1539620dbec88bc634cb2bd5a32ff329c77864c080672ad9586c2

kernel-tools-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: a7801a83191416624c7dc3f74e96a1726989188a5ac3518181a2899f3d9cd263

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: a1adefc17c24b2a16d5b7f8134fef6891c0a0c5856364e712cd250b9fe0ca193

kernel-tools-libs-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 5430148a8f28ac31ec82a918c568f3235ae96b9414ecfc83378b51011a79f7cd

perf-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: d2dfb7494fea0508c30e4ffd6cb8b9413703b2d65eefa519e4e1e6a067286356

perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 6be6480114ca69184aa6799bdc2e9e928785ee4bc19987f298bd866b9ee85c00

python3-perf-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: f89a49701103ba758ec29f1ca9ba354fe68244f0313c7ef294fd8ea668e1b81f

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 44b2640eb9ae0e539a94f1552e834c5c42f8d13e1b57c1eb996b5054ef21a715

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

ppc64le

bpftool-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 1e330375dd80d50795f15875f197cc8116f71911756cf88de96c540e4f8b5f05

bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842

kernel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d031dcf88c1a1f406dfb18b3dfa07225037254188fbaedbe98d3740bc44b00df

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 38543d7def8912433fccc0d35bf163bdb00d7d66f866eb2b6234d09c24b7a737

kernel-cross-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4a9a5658151ed620ded526cd5a7e8257974605520d62ff5ec1025e99df1ac58d

kernel-debug-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 54ab013e11b93a9372669386c37be0460a94339cf6da2df3c3c1618a49981019

kernel-debug-core-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4959bac77b5188c3ad2bbae079109c2024d61c4ed60ca027afbf50c1417be707

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1

kernel-debug-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 38224820a52ed3b9b40afaf4d8dc8bc941041aca72d8c8e2032322fbf1642004

kernel-debug-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: b59892654eaf198082acdd76b0f78c9e3728dfea948451e31977360c815f849f

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: f473b17b483fd01e2eb0ddbe3955a32c2fd0bef70ce917ba30ac3b560f68fa87

kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36

kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c

kernel-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 84e2e4064c29f84d3c114242b23074114d0d6bbf0fcf74e63698c00572768dbb

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d0e68f6d29dc657194a5078628403a7c16f6bf9d8efd94f72268fc61b847181d

kernel-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 58c7dd6ac8acbc115cf4c22c901d29a50ef6ccd6187326d2eaf7548b3d152433

kernel-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 4c0800563ffbda6a991316191800c6885031902d0c63587b5b20dc3ff2225a7e

kernel-tools-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: dcb22185fa2843036f0ec68f738be034c8a291a496e3cedd51794b06bf5464e2

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798

kernel-tools-libs-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: bcc263bc27b6bab70155359c334dc044fda2f5afd6e145ee3d71765c5e4f5f8c

perf-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 78916f8277342e9df9c32c0d3174476e47238c74e7db842aea81ef00a2193aac

perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9

python3-perf-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 360701a97c41647d637b59fab7556aac6ec86d4c043edcef2797a89577d1de64

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.72.1.el8_4.src.rpm

SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d

x86_64

bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b

bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2

kernel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d

kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57

kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d

kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364

kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20

kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec

kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819

kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4

kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd

kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e

kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2

kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6

kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm

SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6

kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46

kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44

kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179

kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689

kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f

perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055

perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30

python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec

kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e

kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689

kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 2c4dee352783d82d4d4fa6bd3a041231403fad6e2fb8c8d04cd4cf0831a8de33

perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm

SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1

kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36

kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798

kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: cdb19b5d08b7640343f1389d699a9891ef1e00b543612f15e7ff5fdcbd5f5fec

perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm

SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 5adb9d38f077b2b4b34f066a3398812f744a8af7bd9d513ebba08f858a2bdeb2

kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 8048c48f55273c81f6018387832296d6df8fb44a3900cf0627ddef03bcca2dec

kernel-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: d11475e93ad6465d46ffd240e6e850766a372d7cf21618eddbd46104513569da

kernel-debuginfo-common-aarch64-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 0e37c0682d6bcadbc81467ec8462c509989d30179f3588a82dcf20f451db4748

kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: a1adefc17c24b2a16d5b7f8134fef6891c0a0c5856364e712cd250b9fe0ca193

kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: aaae7322e1b448f8c0ed5f208bcdcb7d3dbb1f4bf48958c0b210bf63e6ff4da9

perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 6be6480114ca69184aa6799bdc2e9e928785ee4bc19987f298bd866b9ee85c00

python3-perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm

SHA-256: 44b2640eb9ae0e539a94f1552e834c5c42f8d13e1b57c1eb996b5054ef21a715

Related news

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

RHSA-2023:0059: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-9111-01

Red Hat Security Advisory 2022-9111-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.54. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2022-9082-01

Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.

RHSA-2022:9082: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...

RHSA-2022:9040: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.3 security update

Red Hat Advanced Cluster Management for Kubernetes 2.6.3 General Availability release images, which provide security updates, fix bugs, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-41912: crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements

Red Hat Security Advisory 2022-8973-01

Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-8940-01

Red Hat Security Advisory 2022-8940-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8974: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...

RHSA-2022:8941: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8940: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8889: Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update

Openshift Logging Bug Fix Release (5.3.14) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-42003: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS * CVE-2022-42004: jackson-databind: use of deeply nested arrays

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

Red Hat Security Advisory 2022-8809-01

Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8831: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-8767-01

Red Hat Security Advisory 2022-8767-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8765-01

Red Hat Security Advisory 2022-8765-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.

Red Hat Security Advisory 2022-8768-01

Red Hat Security Advisory 2022-8768-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

RHSA-2022:8765: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

RHSA-2022:8768: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()

Red Hat Security Advisory 2022-7933-01

Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:8267: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-0854: ...

RHSA-2022:7933: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...

RHSA-2022:7683: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...

RHSA-2022:7444: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large argume...

CVE-2022-41686: en/security-disclosure/2022/2022-10.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.

Ubuntu Security Notice USN-5650-1

Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2022-2639: Invalid Bug ID

An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.