Headline
RHSA-2023:1557: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
- CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
- kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHEL8.4 - s390/kexec: fix ipl report address for kdump (BZ#2166298)
- Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166370)
- net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167642)
- net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2167712)
- Backport Request for locking/rwsem commits (BZ#2170941)
- ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172552)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
- BZ - 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
x86_64
bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1
bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373
kernel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b
kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e
kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f
kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335
kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224
kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171
kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068
kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008
kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4
kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df
kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5
kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc
kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f
perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649
perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3
python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
x86_64
bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1
bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373
kernel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b
kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e
kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f
kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335
kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224
kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171
kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068
kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008
kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4
kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df
kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5
kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc
kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f
perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649
perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3
python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
s390x
bpftool-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: ad338f2051770ede5338b130e34fe3d5a2f147de0bc6801f3bafe7b64879a309
bpftool-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 25c9f53d5b046dfbab20689caf5bbaa13af225498a228fb0cfa4293c0959ba7a
kernel-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: e1f7b67a6ab60a17b041b056a882f272d329c94b10a1354ef92829672f0a2662
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 77b1ae31dec0b5eebe4c56c7df4b5bf480d1377515918765c874579a105822c4
kernel-cross-headers-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 2b68fb39d17f1c50a0eeda67b586bc3b0715fdef7d14475471bd5ccd0b84b1e9
kernel-debug-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 8f43d2dc517b84c0d7ad47dd26174eb298cd68622b7733e187bafd132d5783b5
kernel-debug-core-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: bd44496a3ab85ace28f44595ba67db767cdea05d674e009edc81d7c7158d3499
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 80d07be6187d22ed1edc3dc404f8e34f3c4d4a8aaaffd9c4a6603117b96babe2
kernel-debug-devel-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: cc37b88ff33f5feb60a3e0d8cbd7384ec914986b757970b907ec4ac56934aafe
kernel-debug-modules-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: ea6198789ef57f331c4b0eee783f805ae1cb554e045cd822830f96c81cc7cc9a
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: c73ab955cb9fbde09b3f889098092349f8f68b6fa10f303f79a380fd3f6a36df
kernel-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: da8278636e4134de1ff1763d59d79697c6f5b38fa9a4e41dae66418666f910a4
kernel-debuginfo-common-s390x-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 52e287d25e61e0849b8cd325a0d24c5e3ed313049296a357fb377604d9999698
kernel-devel-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 11a26a268ddbc7d59ca6c5cace3e55f21f7aa47927160251285347e140d4bcd7
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 9b0875f25da16338dfe0f801ec9cbed217a88f828cee4b9dfb539e3e5a1734f8
kernel-modules-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: bc3baa068a3ef515b4e7a14b4a21a65c52f7db6053fe9bd45625720aadb2a388
kernel-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 73f9458626771f0ef04d1fc10ee976d36410e4df8116304dd2c20c2065d97a8e
kernel-tools-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: b3e80d755134d3702869dddd05afbc4d50c9e42839c3e878c58d136a045395b8
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 543836e3ca7f4c8b7a912a2e36693e4741d07f9a20e10e54894aab8020f0951a
kernel-zfcpdump-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 616e75321803fb37c62d70fc538777686d0e87238b8150b2e77683af6601b82a
kernel-zfcpdump-core-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: a6ba1d8934814ecc314140160f5cdd4fd23ef91486fff701a4cf2e629abbc97c
kernel-zfcpdump-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 2123be526cdae36e1656780b151bf9481123ff340da503c49cc4e83ea7fe5232
kernel-zfcpdump-devel-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 9434c486706c40d1ec700cf7729112a8dd67b01311bf56637def4bdc11662cca
kernel-zfcpdump-modules-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: 4e065e145ac479fd0cd18627adac2588cff3801280f4255a336332422cd82afb
kernel-zfcpdump-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: e748cc5b57980e826a345e6bf8eeea61ccffd0f637ef49cd68bcf94d9d5bc92e
perf-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: df550b52a77ab4fc19efe986e964fb3fdb7aaf6db6a72aa22070b0d2230d308d
perf-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: e1c9d38b52fa3616a885f19e0e6c89c7e4acee003d4ce3487c12d72c1d838df0
python3-perf-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: a051aa0075f81353ec7b970220b10e168395f2d2f896bd07e29f835622aff93a
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm
SHA-256: ddc58fae77fba7abe3e29ee1ee211cd149af136fb55b6f924955a58387aec921
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
ppc64le
bpftool-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: ad14ab572ca1e564a9794eee01102cc50829cc542b83a8977eb27005b3e74022
bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b
kernel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 1a87a6b679c549ebd0213bc20e43669470a9b99f8017813193f74a2d2541dfd2
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 410b45df5f0cc131508be4a40e30a690a893d7bd2191a3ac2bf418cfe63905a6
kernel-cross-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 5fdcf4c2419c85abd81075f18a28b5209092ab45977ed291b464660f9f46ad9f
kernel-debug-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0a2559701cc11ea19a39164797776829b68fa5797bace801becc7a74291072d5
kernel-debug-core-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 60dafcd3e7420b65ae7df3ee2e5c76f771aba9f18edc766e8716def4dbdb9819
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48
kernel-debug-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: c7d34b52147197a95645d25d05007b81c1073d87efc25841c7a8bcfb934bdbcb
kernel-debug-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 925e47ffb0afa58a4c91d0e5957523035f5bf06eadc1a3461e9bf53b1ffb823c
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 107e5e85f6260fd65804adceec0252e7eeee77826bae0a179da0f39163dace28
kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d
kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc
kernel-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 236701748d81975f93a6faab8330e2cb50542a71a97d57fd75d6f739b8de74fa
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: d41a4034be6fbeb03e5d19383f87763c347829c5accadc426dc1c18a3261f896
kernel-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: a43e3a0c17e90ae4f858ad7f2e630c578880da32368cebe52f1846405eda1e1a
kernel-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: a91e57f387d0006fed69f5ddac485bcfe58b3ade84f7a6e2a3d77f79e749b9ae
kernel-tools-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: ebea701ed2fad44e548a0841200d62602ea7edc75dd984a7da403a097bcf6cd3
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529
kernel-tools-libs-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fbc5870e8444c916a9422aafacf6cffec78bb4e97c8b9d0e488d250eb6905d7a
perf-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0f964d5406a7301f98cddfac43a4e92bea83e7e5ebb0f1ed13e68e6a78ec7d63
perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3
python3-perf-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 5fee74cda11becc65ce25d079a98379ffaf71f5aea39a61c38648136a4b98af8
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
x86_64
bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1
bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373
kernel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b
kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e
kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f
kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335
kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224
kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171
kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068
kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008
kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4
kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df
kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5
kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc
kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f
perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649
perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3
python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
aarch64
bpftool-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 3a4143f7100d1cf1e9e584aa1bd01adbb0602851d944c4162c28d94b84fb06a5
bpftool-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 9b1ab65a638b0c8632ac35ffb9ff49fea0262ffc40cfcc264db9697c5fd71bf3
kernel-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 970943661d7a8c38fca5bbd61ba6f5191fb4807e543a897961407628820b7031
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 283ebf1b597e5dc87095c455f6d35d2aae5bd270d1d5f29b20916345e718e9d1
kernel-cross-headers-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 3167589b039e51fa848541b3b5bc2c347492caf4a77423c397983454e2115d0a
kernel-debug-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 6b05405028b4f7e1f755d2052388432b03e14ba0ce3fb107c8ad921cadd6f8b5
kernel-debug-core-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: fa5f7c112456c25da7a7fc14b85c6e26dc6e109d3789636a4689f76a06dfaeb4
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 42ec74c874a2607beec5c107b94772e950bb51d932ca249f48474bf0b7bd5b69
kernel-debug-devel-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 1a0c7fc47c3ca326b48cd5cc10b4660d2af1e99131836afdce61a98f1ea438c5
kernel-debug-modules-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 43f2e775022ed0a46f7c96a3089ded471c045485ed41f741141b530ebd7e788a
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: ef4eea301d572f83c7b6d3bfc7b24b4f6cf624968ab438c48a15480f52ee2107
kernel-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: e9485bdef897127b47278d9674617a0341d8370f56ece588e57ca74627ecd5b7
kernel-debuginfo-common-aarch64-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 0d5c1b365cff42d9f2b4f83a966e09c88fc3a9376b133827a2ff5a4375fa1e82
kernel-devel-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: ef0c49ff1bc93eb1fde6746f9c271ebe41948635ec26358375c8a788ee36598f
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 06d4ead70fe174b5e07745abc43f9713463cf826bccd107fddf883e70a287be1
kernel-modules-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 8eb4cfffacfdca61d21bc7fd4e3e46d5a237bf20e5fcb64f52528bfa3c36ec4b
kernel-modules-extra-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 99118c67efabfe2f84b633d0baaef05bd026a95a5728a5c48b6012a36e140306
kernel-tools-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 88f57fb003551e5854e2819d7a8d54ec4807fe2828228afe3fa2fbfae28b1d44
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 2c0bff136263b7dfe0bf0adfa6829fa2c1552efeb6bd9518931c77dde1800ebf
kernel-tools-libs-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 13fb28e147e254ff533a3927f1dbde93b25c7ff971d625dcf60a074c58939966
perf-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: d1752199e363a296bf5697650f4e205ef85b4f98629cb97cd853bfb9df054765
perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 9fd74c0966c79e11e30fe6b439ee1c02305e9aa755230fdbd6ec5a2b59af7112
python3-perf-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: f92517596e966a29af1b1fac8e42d418f55840be6e80bbfd23d3dc24a90722a3
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 92f7adf77ea6cf11d67f604975ec01130ec0bf01a808e52767f73a7e1502b713
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
ppc64le
bpftool-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: ad14ab572ca1e564a9794eee01102cc50829cc542b83a8977eb27005b3e74022
bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b
kernel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 1a87a6b679c549ebd0213bc20e43669470a9b99f8017813193f74a2d2541dfd2
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 410b45df5f0cc131508be4a40e30a690a893d7bd2191a3ac2bf418cfe63905a6
kernel-cross-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 5fdcf4c2419c85abd81075f18a28b5209092ab45977ed291b464660f9f46ad9f
kernel-debug-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0a2559701cc11ea19a39164797776829b68fa5797bace801becc7a74291072d5
kernel-debug-core-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 60dafcd3e7420b65ae7df3ee2e5c76f771aba9f18edc766e8716def4dbdb9819
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48
kernel-debug-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: c7d34b52147197a95645d25d05007b81c1073d87efc25841c7a8bcfb934bdbcb
kernel-debug-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 925e47ffb0afa58a4c91d0e5957523035f5bf06eadc1a3461e9bf53b1ffb823c
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 107e5e85f6260fd65804adceec0252e7eeee77826bae0a179da0f39163dace28
kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d
kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc
kernel-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 236701748d81975f93a6faab8330e2cb50542a71a97d57fd75d6f739b8de74fa
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: d41a4034be6fbeb03e5d19383f87763c347829c5accadc426dc1c18a3261f896
kernel-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: a43e3a0c17e90ae4f858ad7f2e630c578880da32368cebe52f1846405eda1e1a
kernel-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: a91e57f387d0006fed69f5ddac485bcfe58b3ade84f7a6e2a3d77f79e749b9ae
kernel-tools-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: ebea701ed2fad44e548a0841200d62602ea7edc75dd984a7da403a097bcf6cd3
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529
kernel-tools-libs-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fbc5870e8444c916a9422aafacf6cffec78bb4e97c8b9d0e488d250eb6905d7a
perf-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0f964d5406a7301f98cddfac43a4e92bea83e7e5ebb0f1ed13e68e6a78ec7d63
perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3
python3-perf-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 5fee74cda11becc65ce25d079a98379ffaf71f5aea39a61c38648136a4b98af8
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.86.2.el8_4.src.rpm
SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6
x86_64
bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1
bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373
kernel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc
kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32
kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b
kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e
kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f
kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335
kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224
kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad
kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171
kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068
kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008
kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed
kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm
SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b
kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4
kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df
kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5
kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc
kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f
perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649
perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3
python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335
kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068
kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc
kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: 7d4721526d06a2e03cfd06d3c6f5460c245ba39c9b83f8997882f016240f9f42
perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm
SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48
kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d
kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529
kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fc8840dd3eeb0c01c1de5e15d1c084b1072ab948f171e18aecb01d1383d4f3c9
perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm
SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 9b1ab65a638b0c8632ac35ffb9ff49fea0262ffc40cfcc264db9697c5fd71bf3
kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 42ec74c874a2607beec5c107b94772e950bb51d932ca249f48474bf0b7bd5b69
kernel-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: e9485bdef897127b47278d9674617a0341d8370f56ece588e57ca74627ecd5b7
kernel-debuginfo-common-aarch64-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 0d5c1b365cff42d9f2b4f83a966e09c88fc3a9376b133827a2ff5a4375fa1e82
kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 2c0bff136263b7dfe0bf0adfa6829fa2c1552efeb6bd9518931c77dde1800ebf
kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: a2dceef315929b94aadfa95030cd58c3cdaad4c748243dc68fad97753348c54a
perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 9fd74c0966c79e11e30fe6b439ee1c02305e9aa755230fdbd6ec5a2b59af7112
python3-perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm
SHA-256: 92f7adf77ea6cf11d67f604975ec01130ec0bf01a808e52767f73a7e1502b713
Related news
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local ...
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Red Hat Security Advisory 2023-3490-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1390: A remote denial of service vu...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...
Red Hat Security Advisory 2023-2148-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-1923-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Ubuntu Security Notice 6030-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2023-1841-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.
Red Hat Security Advisory 2023-1660-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux So...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem. * CVE...
Red Hat Security Advisory 2023-1556-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1560-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2023-0266: A us...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue. * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context...
Ubuntu Security Notice 5991-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Google TAG researchers reveal two campaigns against iOS, Android, and Chrome users that demonstrate how the commercial surveillance market is thriving despite government-imposed limits.
Red Hat Security Advisory 2023-1471-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a double free vulnerability.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4744: A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in the...
Ubuntu Security Notice 5970-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.
Ubuntu Security Notice 5951-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5950-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
Ubuntu Security Notice 5941-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5939-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5925-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the Kernel Connection Multiplexor socket implementation in the Linux kernel when releasing sockets in certain situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5920-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5919-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5911-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5912-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e