Headline
RHSA-2022:8767: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHEL8.6: Backport upstream migrate_disable for PREEMPT_RT support (BZ#2140304)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2084479 - CVE-2022-2639 kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
x86_64
bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b
bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2
kernel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d
kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364
kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20
kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec
kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819
kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd
kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e
kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2
kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46
kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44
kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179
kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689
kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f
perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055
perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30
python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
x86_64
bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b
bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2
kernel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d
kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364
kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20
kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec
kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819
kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd
kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e
kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2
kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46
kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44
kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179
kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689
kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f
perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055
perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30
python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
s390x
bpftool-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 0971502926b623fec9af36fbbe16d2fda6b109488c6f63f93e55d9bfe113a8a2
bpftool-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: aa91ce73a6e2e528a544c9be15ea5c801474502e0778824caa4b7ee34140fd3b
kernel-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 91138588d16cd2f3b90a31aad572ed42bebbfb6c24b5c0c60256125f4da30f08
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: a61264697346268089af985e4b983ff8592fcd715198de53a401027f3780c2c7
kernel-cross-headers-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 32ad633bca2e17562229fbd10e0f56ce645922ba9a6aa326193602d68ab9ad1c
kernel-debug-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: be9eb6201ebd541ae0fed762acacb5c3a845b7ae02a9c47b5b9a54f2da26072f
kernel-debug-core-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 34b50f44a7a3a1161d9e98eb220aeb384e5d30ee47d4861f4c388ceee72f2859
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 8be9a0d957e91cfb833519cf0ce8f40b7adf7b0d001c3ff89e644a74b977eddf
kernel-debug-devel-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: fc8a4f019f0345d444a9716197d7548037611c723517b497b608c2a5b3eff529
kernel-debug-modules-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 8d2107f56c60311228d76f805f44d3f81affa96bdda46f158e89714db7fbb33c
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: dabdeeccd597bd1f92598a8fb17e6ef5fe369952905fd6f31e8bec4779f4e12f
kernel-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: bd8cfff3de31df18a294191566549085ae0576e92315c5dd39bd1dd53fa105c8
kernel-debuginfo-common-s390x-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 3df12d7cd621fa8d63996989b446d84c755375b5f411820654a60213d14b64e1
kernel-devel-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: d1c8eee341b93ad2f26423ba5e38e26b5a10b683ba29cbb8c7888a70e855d6a6
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: d00e72a1b24535ecb7cbe542fe53cf81e044f06372e1724781e02bdb22649c51
kernel-modules-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: c33bf26e6387d02cbdb2179185d0819955e4524428126a0e1c0d54bc9c631860
kernel-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 5dbd5ef8151d096d9eb9ced278f81e8132a12a1de1a95a7cda9bfdc2bb19675f
kernel-tools-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 1340b62df490981cfe174367496d4cfe5dbc2013727559506a940c8e521e4f94
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 2af32cb6992ce45b849b42dba7caa5b68056006b9d7dc046ce3ec471f674211b
kernel-zfcpdump-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 6eeefe7ecbf878397c92fe7c6582a87217705827307223b7ea5db943b530b288
kernel-zfcpdump-core-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 339a2efc9bb53d06a1bf5886014238eb395725904e955d69b43b8018217bb31c
kernel-zfcpdump-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 4457ec8337d4108485a28ed40b1dd86fc409f4fc0ed905437df413932f172c09
kernel-zfcpdump-devel-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 8a0032ed0a7bdd94de81d43053aa27d8a1aee4e7da32f3882b27927e93b219a6
kernel-zfcpdump-modules-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 418cef4a8364c694a53a4b85158be21eced492e9e57fdc3763b8efe4bc285ae7
kernel-zfcpdump-modules-extra-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 9ebc200781974646e112f81e34c85202c092ec65117b127fe700e11b3558a045
perf-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 5daa45f3467d32894e485e3f7ab80aa8e3c71bc03c20481296dbb9abe14a997e
perf-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 20efdbab71e3d5b8c04245e2d206509b1047a24c6631de1515a4cdf54017bfbd
python3-perf-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 4dba47faef34427b35f438807ac55a2f11f2202082ab472a6d903079a268a814
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.s390x.rpm
SHA-256: 26371f8add86c532caf27da033438c95b05d5cef9efaa202e59d4228b127c7e8
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
ppc64le
bpftool-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 1e330375dd80d50795f15875f197cc8116f71911756cf88de96c540e4f8b5f05
bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842
kernel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d031dcf88c1a1f406dfb18b3dfa07225037254188fbaedbe98d3740bc44b00df
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 38543d7def8912433fccc0d35bf163bdb00d7d66f866eb2b6234d09c24b7a737
kernel-cross-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4a9a5658151ed620ded526cd5a7e8257974605520d62ff5ec1025e99df1ac58d
kernel-debug-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 54ab013e11b93a9372669386c37be0460a94339cf6da2df3c3c1618a49981019
kernel-debug-core-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4959bac77b5188c3ad2bbae079109c2024d61c4ed60ca027afbf50c1417be707
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1
kernel-debug-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 38224820a52ed3b9b40afaf4d8dc8bc941041aca72d8c8e2032322fbf1642004
kernel-debug-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: b59892654eaf198082acdd76b0f78c9e3728dfea948451e31977360c815f849f
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: f473b17b483fd01e2eb0ddbe3955a32c2fd0bef70ce917ba30ac3b560f68fa87
kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36
kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c
kernel-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 84e2e4064c29f84d3c114242b23074114d0d6bbf0fcf74e63698c00572768dbb
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d0e68f6d29dc657194a5078628403a7c16f6bf9d8efd94f72268fc61b847181d
kernel-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 58c7dd6ac8acbc115cf4c22c901d29a50ef6ccd6187326d2eaf7548b3d152433
kernel-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4c0800563ffbda6a991316191800c6885031902d0c63587b5b20dc3ff2225a7e
kernel-tools-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: dcb22185fa2843036f0ec68f738be034c8a291a496e3cedd51794b06bf5464e2
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798
kernel-tools-libs-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: bcc263bc27b6bab70155359c334dc044fda2f5afd6e145ee3d71765c5e4f5f8c
perf-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 78916f8277342e9df9c32c0d3174476e47238c74e7db842aea81ef00a2193aac
perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9
python3-perf-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 360701a97c41647d637b59fab7556aac6ec86d4c043edcef2797a89577d1de64
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
x86_64
bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b
bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2
kernel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d
kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364
kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20
kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec
kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819
kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd
kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e
kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2
kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46
kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44
kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179
kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689
kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f
perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055
perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30
python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
aarch64
bpftool-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 06412b10552261542a1a37ce343c83741ecca12d7cef8e48d52107a07082e965
bpftool-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 5adb9d38f077b2b4b34f066a3398812f744a8af7bd9d513ebba08f858a2bdeb2
kernel-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 16cd65c0f4db544d8b6b7d3cabc1efd422714980c75cbb9b35760a3553e7ae51
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: fec8daff1f7d5b9162759cf2313918e585bb1a5983a1b0869af521500f2f5597
kernel-cross-headers-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: ca1d03ca5d64a17527bf238fd9562c3fe5257cc337bc1a07ad5b4dd4d219a351
kernel-debug-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 46f5a11d6a6e21f2d3daf9fd09a8b109943cd49604ee0ef7af9858d7e3d5f89a
kernel-debug-core-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 8f26858ed4031e3393c8b33d22b6ae9c2b42bb4af1ab5ee1c92a198f44495218
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 8048c48f55273c81f6018387832296d6df8fb44a3900cf0627ddef03bcca2dec
kernel-debug-devel-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 7a23cf747d31752dc6aff35043addf87aec68595339ef7a42c7f08101aad8380
kernel-debug-modules-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 5fb02fd6ccde08376529001337c60d53b10dacbcc866418dc01822693606dafb
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 053ac9c7fe9cf5433f8cf681fb09e345f3daeef5897aaef1d6a3bfc6941ed9ea
kernel-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: d11475e93ad6465d46ffd240e6e850766a372d7cf21618eddbd46104513569da
kernel-debuginfo-common-aarch64-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 0e37c0682d6bcadbc81467ec8462c509989d30179f3588a82dcf20f451db4748
kernel-devel-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: f5c3d13737049e06a97b3b390c0f6591da48d4f3b4ab306020dbeb05802aa82f
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: f009948b1330f3516c8326c03ee3bc1010a9a08639b263e9368d24371f1ad50b
kernel-modules-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 58eb933a45aca1de1665bbe5a3fe524608d8064d4d13d95750b061f6ff4a5ea1
kernel-modules-extra-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 7ffeb82615d1539620dbec88bc634cb2bd5a32ff329c77864c080672ad9586c2
kernel-tools-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: a7801a83191416624c7dc3f74e96a1726989188a5ac3518181a2899f3d9cd263
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: a1adefc17c24b2a16d5b7f8134fef6891c0a0c5856364e712cd250b9fe0ca193
kernel-tools-libs-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 5430148a8f28ac31ec82a918c568f3235ae96b9414ecfc83378b51011a79f7cd
perf-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: d2dfb7494fea0508c30e4ffd6cb8b9413703b2d65eefa519e4e1e6a067286356
perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 6be6480114ca69184aa6799bdc2e9e928785ee4bc19987f298bd866b9ee85c00
python3-perf-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: f89a49701103ba758ec29f1ca9ba354fe68244f0313c7ef294fd8ea668e1b81f
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 44b2640eb9ae0e539a94f1552e834c5c42f8d13e1b57c1eb996b5054ef21a715
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
ppc64le
bpftool-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 1e330375dd80d50795f15875f197cc8116f71911756cf88de96c540e4f8b5f05
bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842
kernel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d031dcf88c1a1f406dfb18b3dfa07225037254188fbaedbe98d3740bc44b00df
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 38543d7def8912433fccc0d35bf163bdb00d7d66f866eb2b6234d09c24b7a737
kernel-cross-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4a9a5658151ed620ded526cd5a7e8257974605520d62ff5ec1025e99df1ac58d
kernel-debug-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 54ab013e11b93a9372669386c37be0460a94339cf6da2df3c3c1618a49981019
kernel-debug-core-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4959bac77b5188c3ad2bbae079109c2024d61c4ed60ca027afbf50c1417be707
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1
kernel-debug-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 38224820a52ed3b9b40afaf4d8dc8bc941041aca72d8c8e2032322fbf1642004
kernel-debug-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: b59892654eaf198082acdd76b0f78c9e3728dfea948451e31977360c815f849f
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: f473b17b483fd01e2eb0ddbe3955a32c2fd0bef70ce917ba30ac3b560f68fa87
kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36
kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c
kernel-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 84e2e4064c29f84d3c114242b23074114d0d6bbf0fcf74e63698c00572768dbb
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d0e68f6d29dc657194a5078628403a7c16f6bf9d8efd94f72268fc61b847181d
kernel-modules-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 58c7dd6ac8acbc115cf4c22c901d29a50ef6ccd6187326d2eaf7548b3d152433
kernel-modules-extra-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 4c0800563ffbda6a991316191800c6885031902d0c63587b5b20dc3ff2225a7e
kernel-tools-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: dcb22185fa2843036f0ec68f738be034c8a291a496e3cedd51794b06bf5464e2
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798
kernel-tools-libs-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: bcc263bc27b6bab70155359c334dc044fda2f5afd6e145ee3d71765c5e4f5f8c
perf-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 78916f8277342e9df9c32c0d3174476e47238c74e7db842aea81ef00a2193aac
perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9
python3-perf-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 360701a97c41647d637b59fab7556aac6ec86d4c043edcef2797a89577d1de64
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.72.1.el8_4.src.rpm
SHA-256: 3057b8ba3d117e8d81167004d31e8559618f136055a3e37d76ef32590dd4508d
x86_64
bpftool-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 26dc8bd9c933741e9401c98d2026312b7fe50784d555754c04188bf45a7b139b
bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2
kernel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: c2e1600a5bd2af046c9ca2957a58532b1d07a16e064367b45997107f247e0c3d
kernel-abi-stablelists-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: 6dead4ebcfc47bac11299d1e99c65e9068692b43bb15178ec5c4ebfcc6a03a57
kernel-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 265ab7505b59779a851220fedb9cf0ed476463a4c4284efc03f86557f0007e4d
kernel-cross-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: dbf15f4b91dae8c925d34a80464afe755b3cd9c4561c118addcffc693c7c7364
kernel-debug-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 1bd03c1a57416119803d5b4b81d6bfc516a09c36dd1c1370b5ad9da9c9c91a20
kernel-debug-core-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: b61896c71be3382089364a4102f899bff79c63c4bc58ee181491caf7dff2ab53
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec
kernel-debug-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 8c283abc751cde691a50a0fc00d639b4b1472f283152123983c985ff05566819
kernel-debug-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4951f961f8d0f61b3f11614f563bbc04397bec282cd939b49011137fc12b8ea4
kernel-debug-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 6c8ee13838799dfc5dad4bd53a3ad5141b58bc6a01cd42c2a837cb8eef4d03dd
kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e
kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2
kernel-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 505ffef07f390d5832111a3986ff41ea9a63492f6e15b09d70becb2277f71db6
kernel-doc-4.18.0-305.72.1.el8_4.noarch.rpm
SHA-256: ae182db60aafdd86cd295174109359891ee1158e4494b9b083fc89524c15adc6
kernel-headers-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: d0163cfc5d3df46660815dfcbbcfe9b81a76fe810f6c300a5b92a41e37d8bf46
kernel-modules-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 4a0d1ca56b117b3c26070055c53069f1f5d63bd1d12ca1670eb329cc29b47e44
kernel-modules-extra-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 73991ca07578be6cde9997f6ab82cf064d8070277e64b50235cea3a82b42d179
kernel-tools-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 426ca90588fe953d477a33b9a8adf737a283a95b2ee01c0d3ea526ccdd24249c
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689
kernel-tools-libs-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: eee3d0ee31de3e42e66b78c1bd7b7ec5f73f5dd9b6db73096ecf9e6df7e68c1f
perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 29ecd6221d504779084f16372ccf9ea0e4adc7be7c3f1541aceea7ee7e644055
perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30
python3-perf-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: be8fd0fea6a2fcdf24d1bb480f879785f22386bb3ac457fcf0a4938907d5878f
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 9b0dbd91773347f7b22940d79f0aba83836db961761496c03578ad30d72ebcd2
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 5055f3d09a3fc903b0eaedb1899138bf3d3c239106f0176baa4272e56c6187ec
kernel-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: bcb5f6fe8ea71fadfbd8659c9fb4a14c3edd4af95b8c35660773bca4fb35104e
kernel-debuginfo-common-x86_64-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 3c9ae0daf002242b1a470c4207283fda387ba32529c27e12cc0b4441cd783ab2
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f85ecd465e8413906aa6bdba9ae28623aeb40f03247886343a3dc5977aee4689
kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 2c4dee352783d82d4d4fa6bd3a041231403fad6e2fb8c8d04cd4cf0831a8de33
perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: f120426670c90876665584705e19dc9a82eb002f7a49b46fa56a21fb60daab30
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.x86_64.rpm
SHA-256: 0be4a760107316c877c0e2e2312c7aad50bb38286e16dbba800ee5621043d86e
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 90eb45a1586c1dfec95dd794bed8aee59d471e7843314977cca84f6b743f4842
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 504132a99edefbc6bb66194c3b7c6b9743c877eb8fb7e9851c59e4c476b0f2b1
kernel-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 09e7d1e067b32b67bcc2ccacb6fed44dc37f2ae1525f3be51685dee530d68e36
kernel-debuginfo-common-ppc64le-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: e3ec599faab27bbab2a56afb055e806e2c241f3170125bad7010464d50daf11c
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 9df4e77987dc3f2b06d9405b69899830161f57227d9797a1feb63b3684ba5798
kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: cdb19b5d08b7640343f1389d699a9891ef1e00b543612f15e7ff5fdcbd5f5fec
perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: 59096311ac1e1954db019f5ee6da2f713b1f3cc1653f7c109843059a7bfff2d9
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.ppc64le.rpm
SHA-256: d358003903fac2cd82e62f44ab97f7a4a57b5678abb3d138aba59a06f4a59908
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 5adb9d38f077b2b4b34f066a3398812f744a8af7bd9d513ebba08f858a2bdeb2
kernel-debug-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 8048c48f55273c81f6018387832296d6df8fb44a3900cf0627ddef03bcca2dec
kernel-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: d11475e93ad6465d46ffd240e6e850766a372d7cf21618eddbd46104513569da
kernel-debuginfo-common-aarch64-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 0e37c0682d6bcadbc81467ec8462c509989d30179f3588a82dcf20f451db4748
kernel-tools-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: a1adefc17c24b2a16d5b7f8134fef6891c0a0c5856364e712cd250b9fe0ca193
kernel-tools-libs-devel-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: aaae7322e1b448f8c0ed5f208bcdcb7d3dbb1f4bf48958c0b210bf63e6ff4da9
perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 6be6480114ca69184aa6799bdc2e9e928785ee4bc19987f298bd866b9ee85c00
python3-perf-debuginfo-4.18.0-305.72.1.el8_4.aarch64.rpm
SHA-256: 44b2640eb9ae0e539a94f1552e834c5c42f8d13e1b57c1eb996b5054ef21a715
Related news
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Advisory 2022-9111-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.54. Issues addressed include a code execution vulnerability.
Red Hat Security Advisory 2022-9082-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and privilege escalation vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-43945: kernel: nfsd buffer overflow by RP...
Red Hat Advanced Cluster Management for Kubernetes 2.6.3 General Availability release images, which provide security updates, fix bugs, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-41912: crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements
Red Hat Security Advisory 2022-8973-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, code execution, memory leak, out of bounds write, and privilege escalation vulnerabilities.
Red Hat Security Advisory 2022-8940-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-21123: hw: cpu: incomplete clean-up of multi...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Openshift Logging Bug Fix Release (5.3.14) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-42003: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS * CVE-2022-42004: jackson-databind: use of deeply nested arrays
Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.
Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...
Red Hat Security Advisory 2022-8809-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1158: kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Advisory 2022-8767-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8765-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an out of bounds write vulnerability.
Red Hat Security Advisory 2022-8768-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2639: kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
Red Hat Security Advisory 2022-7933-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include code execution, denial of service, double free, information leakage, null pointer, out of bounds access, out of bounds write, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-0854: ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2022-0168: kernel: smb2_ioctl_query_info NULL pointer dereference * CVE-2022-0617: kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback * CVE-2022-085...
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large arguments...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36516: kernel: off-path attacker may inject data or terminate victim's TCP session * CVE-2020-36558: kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference * CVE-2021-3640: kernel: use-after-free vulnerability in function sco_sock_sendmsg() * CVE-2021-30002: kernel: memory leak for large argume...
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.
Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.