Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1557: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
  • CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Red Hat Security Data
#vulnerability#windows#linux#red_hat#ibm#sap#ssl

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
  • kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHEL8.4 - s390/kexec: fix ipl report address for kdump (BZ#2166298)
  • Windows Server 2019 guest randomly pauses with “KVM: entry failed, hardware error 0x80000021” (BZ#2166370)
  • net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167642)
  • net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2167712)
  • Backport Request for locking/rwsem commits (BZ#2170941)
  • ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172552)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
  • BZ - 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

x86_64

bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1

bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373

kernel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b

kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e

kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f

kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335

kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224

kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171

kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068

kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008

kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4

kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df

kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5

kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc

kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f

perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649

perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3

python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

x86_64

bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1

bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373

kernel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b

kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e

kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f

kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335

kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224

kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171

kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068

kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008

kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4

kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df

kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5

kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc

kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f

perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649

perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3

python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

s390x

bpftool-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: ad338f2051770ede5338b130e34fe3d5a2f147de0bc6801f3bafe7b64879a309

bpftool-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 25c9f53d5b046dfbab20689caf5bbaa13af225498a228fb0cfa4293c0959ba7a

kernel-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: e1f7b67a6ab60a17b041b056a882f272d329c94b10a1354ef92829672f0a2662

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 77b1ae31dec0b5eebe4c56c7df4b5bf480d1377515918765c874579a105822c4

kernel-cross-headers-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 2b68fb39d17f1c50a0eeda67b586bc3b0715fdef7d14475471bd5ccd0b84b1e9

kernel-debug-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 8f43d2dc517b84c0d7ad47dd26174eb298cd68622b7733e187bafd132d5783b5

kernel-debug-core-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: bd44496a3ab85ace28f44595ba67db767cdea05d674e009edc81d7c7158d3499

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 80d07be6187d22ed1edc3dc404f8e34f3c4d4a8aaaffd9c4a6603117b96babe2

kernel-debug-devel-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: cc37b88ff33f5feb60a3e0d8cbd7384ec914986b757970b907ec4ac56934aafe

kernel-debug-modules-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: ea6198789ef57f331c4b0eee783f805ae1cb554e045cd822830f96c81cc7cc9a

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: c73ab955cb9fbde09b3f889098092349f8f68b6fa10f303f79a380fd3f6a36df

kernel-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: da8278636e4134de1ff1763d59d79697c6f5b38fa9a4e41dae66418666f910a4

kernel-debuginfo-common-s390x-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 52e287d25e61e0849b8cd325a0d24c5e3ed313049296a357fb377604d9999698

kernel-devel-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 11a26a268ddbc7d59ca6c5cace3e55f21f7aa47927160251285347e140d4bcd7

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 9b0875f25da16338dfe0f801ec9cbed217a88f828cee4b9dfb539e3e5a1734f8

kernel-modules-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: bc3baa068a3ef515b4e7a14b4a21a65c52f7db6053fe9bd45625720aadb2a388

kernel-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 73f9458626771f0ef04d1fc10ee976d36410e4df8116304dd2c20c2065d97a8e

kernel-tools-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: b3e80d755134d3702869dddd05afbc4d50c9e42839c3e878c58d136a045395b8

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 543836e3ca7f4c8b7a912a2e36693e4741d07f9a20e10e54894aab8020f0951a

kernel-zfcpdump-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 616e75321803fb37c62d70fc538777686d0e87238b8150b2e77683af6601b82a

kernel-zfcpdump-core-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: a6ba1d8934814ecc314140160f5cdd4fd23ef91486fff701a4cf2e629abbc97c

kernel-zfcpdump-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 2123be526cdae36e1656780b151bf9481123ff340da503c49cc4e83ea7fe5232

kernel-zfcpdump-devel-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 9434c486706c40d1ec700cf7729112a8dd67b01311bf56637def4bdc11662cca

kernel-zfcpdump-modules-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: 4e065e145ac479fd0cd18627adac2588cff3801280f4255a336332422cd82afb

kernel-zfcpdump-modules-extra-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: e748cc5b57980e826a345e6bf8eeea61ccffd0f637ef49cd68bcf94d9d5bc92e

perf-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: df550b52a77ab4fc19efe986e964fb3fdb7aaf6db6a72aa22070b0d2230d308d

perf-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: e1c9d38b52fa3616a885f19e0e6c89c7e4acee003d4ce3487c12d72c1d838df0

python3-perf-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: a051aa0075f81353ec7b970220b10e168395f2d2f896bd07e29f835622aff93a

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.s390x.rpm

SHA-256: ddc58fae77fba7abe3e29ee1ee211cd149af136fb55b6f924955a58387aec921

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

ppc64le

bpftool-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: ad14ab572ca1e564a9794eee01102cc50829cc542b83a8977eb27005b3e74022

bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b

kernel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 1a87a6b679c549ebd0213bc20e43669470a9b99f8017813193f74a2d2541dfd2

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 410b45df5f0cc131508be4a40e30a690a893d7bd2191a3ac2bf418cfe63905a6

kernel-cross-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 5fdcf4c2419c85abd81075f18a28b5209092ab45977ed291b464660f9f46ad9f

kernel-debug-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0a2559701cc11ea19a39164797776829b68fa5797bace801becc7a74291072d5

kernel-debug-core-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 60dafcd3e7420b65ae7df3ee2e5c76f771aba9f18edc766e8716def4dbdb9819

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48

kernel-debug-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: c7d34b52147197a95645d25d05007b81c1073d87efc25841c7a8bcfb934bdbcb

kernel-debug-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 925e47ffb0afa58a4c91d0e5957523035f5bf06eadc1a3461e9bf53b1ffb823c

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 107e5e85f6260fd65804adceec0252e7eeee77826bae0a179da0f39163dace28

kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d

kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc

kernel-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 236701748d81975f93a6faab8330e2cb50542a71a97d57fd75d6f739b8de74fa

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: d41a4034be6fbeb03e5d19383f87763c347829c5accadc426dc1c18a3261f896

kernel-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: a43e3a0c17e90ae4f858ad7f2e630c578880da32368cebe52f1846405eda1e1a

kernel-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: a91e57f387d0006fed69f5ddac485bcfe58b3ade84f7a6e2a3d77f79e749b9ae

kernel-tools-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: ebea701ed2fad44e548a0841200d62602ea7edc75dd984a7da403a097bcf6cd3

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529

kernel-tools-libs-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fbc5870e8444c916a9422aafacf6cffec78bb4e97c8b9d0e488d250eb6905d7a

perf-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0f964d5406a7301f98cddfac43a4e92bea83e7e5ebb0f1ed13e68e6a78ec7d63

perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3

python3-perf-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 5fee74cda11becc65ce25d079a98379ffaf71f5aea39a61c38648136a4b98af8

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

x86_64

bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1

bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373

kernel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b

kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e

kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f

kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335

kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224

kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171

kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068

kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008

kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4

kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df

kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5

kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc

kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f

perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649

perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3

python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

aarch64

bpftool-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 3a4143f7100d1cf1e9e584aa1bd01adbb0602851d944c4162c28d94b84fb06a5

bpftool-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 9b1ab65a638b0c8632ac35ffb9ff49fea0262ffc40cfcc264db9697c5fd71bf3

kernel-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 970943661d7a8c38fca5bbd61ba6f5191fb4807e543a897961407628820b7031

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 283ebf1b597e5dc87095c455f6d35d2aae5bd270d1d5f29b20916345e718e9d1

kernel-cross-headers-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 3167589b039e51fa848541b3b5bc2c347492caf4a77423c397983454e2115d0a

kernel-debug-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 6b05405028b4f7e1f755d2052388432b03e14ba0ce3fb107c8ad921cadd6f8b5

kernel-debug-core-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: fa5f7c112456c25da7a7fc14b85c6e26dc6e109d3789636a4689f76a06dfaeb4

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 42ec74c874a2607beec5c107b94772e950bb51d932ca249f48474bf0b7bd5b69

kernel-debug-devel-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 1a0c7fc47c3ca326b48cd5cc10b4660d2af1e99131836afdce61a98f1ea438c5

kernel-debug-modules-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 43f2e775022ed0a46f7c96a3089ded471c045485ed41f741141b530ebd7e788a

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: ef4eea301d572f83c7b6d3bfc7b24b4f6cf624968ab438c48a15480f52ee2107

kernel-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: e9485bdef897127b47278d9674617a0341d8370f56ece588e57ca74627ecd5b7

kernel-debuginfo-common-aarch64-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 0d5c1b365cff42d9f2b4f83a966e09c88fc3a9376b133827a2ff5a4375fa1e82

kernel-devel-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: ef0c49ff1bc93eb1fde6746f9c271ebe41948635ec26358375c8a788ee36598f

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 06d4ead70fe174b5e07745abc43f9713463cf826bccd107fddf883e70a287be1

kernel-modules-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 8eb4cfffacfdca61d21bc7fd4e3e46d5a237bf20e5fcb64f52528bfa3c36ec4b

kernel-modules-extra-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 99118c67efabfe2f84b633d0baaef05bd026a95a5728a5c48b6012a36e140306

kernel-tools-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 88f57fb003551e5854e2819d7a8d54ec4807fe2828228afe3fa2fbfae28b1d44

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 2c0bff136263b7dfe0bf0adfa6829fa2c1552efeb6bd9518931c77dde1800ebf

kernel-tools-libs-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 13fb28e147e254ff533a3927f1dbde93b25c7ff971d625dcf60a074c58939966

perf-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: d1752199e363a296bf5697650f4e205ef85b4f98629cb97cd853bfb9df054765

perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 9fd74c0966c79e11e30fe6b439ee1c02305e9aa755230fdbd6ec5a2b59af7112

python3-perf-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: f92517596e966a29af1b1fac8e42d418f55840be6e80bbfd23d3dc24a90722a3

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 92f7adf77ea6cf11d67f604975ec01130ec0bf01a808e52767f73a7e1502b713

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

ppc64le

bpftool-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: ad14ab572ca1e564a9794eee01102cc50829cc542b83a8977eb27005b3e74022

bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b

kernel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 1a87a6b679c549ebd0213bc20e43669470a9b99f8017813193f74a2d2541dfd2

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 410b45df5f0cc131508be4a40e30a690a893d7bd2191a3ac2bf418cfe63905a6

kernel-cross-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 5fdcf4c2419c85abd81075f18a28b5209092ab45977ed291b464660f9f46ad9f

kernel-debug-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0a2559701cc11ea19a39164797776829b68fa5797bace801becc7a74291072d5

kernel-debug-core-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 60dafcd3e7420b65ae7df3ee2e5c76f771aba9f18edc766e8716def4dbdb9819

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48

kernel-debug-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: c7d34b52147197a95645d25d05007b81c1073d87efc25841c7a8bcfb934bdbcb

kernel-debug-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 925e47ffb0afa58a4c91d0e5957523035f5bf06eadc1a3461e9bf53b1ffb823c

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 107e5e85f6260fd65804adceec0252e7eeee77826bae0a179da0f39163dace28

kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d

kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc

kernel-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 236701748d81975f93a6faab8330e2cb50542a71a97d57fd75d6f739b8de74fa

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: d41a4034be6fbeb03e5d19383f87763c347829c5accadc426dc1c18a3261f896

kernel-modules-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: a43e3a0c17e90ae4f858ad7f2e630c578880da32368cebe52f1846405eda1e1a

kernel-modules-extra-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: a91e57f387d0006fed69f5ddac485bcfe58b3ade84f7a6e2a3d77f79e749b9ae

kernel-tools-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: ebea701ed2fad44e548a0841200d62602ea7edc75dd984a7da403a097bcf6cd3

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529

kernel-tools-libs-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fbc5870e8444c916a9422aafacf6cffec78bb4e97c8b9d0e488d250eb6905d7a

perf-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0f964d5406a7301f98cddfac43a4e92bea83e7e5ebb0f1ed13e68e6a78ec7d63

perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3

python3-perf-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 5fee74cda11becc65ce25d079a98379ffaf71f5aea39a61c38648136a4b98af8

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.86.2.el8_4.src.rpm

SHA-256: 7a7aa99d1cc506033a120cfd880c3f1553485c54e484b6b29af896f76f63f9f6

x86_64

bpftool-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 39783d303219b8b25f67502eb6e094078761ac97dc005246cb08716bace777a1

bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373

kernel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 52be4c8e2c08c4b857df4c4128d73dce1ef98287b1a24d03062aa4d3558c63dc

kernel-abi-stablelists-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 4c06562c370230f5ca6ed4b921d30fe25393b7fb7e331369c324ee0e1133cb32

kernel-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 9d9ea563a9b208f1bdaad63429973493525bb8119a544192ec968707ca386f3b

kernel-cross-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8d8db492c66a546f6146ab6127056f70d30941201dd4a2c6b6fa8e71711c800e

kernel-debug-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 416c726a399d3efba60508a0233cbb57a93648f63235fc23ca5c49d65b8bfd2f

kernel-debug-core-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 22e8166cc8867c04fe53d879255bf417bdd114144f575e12a30c7e75fac01f24

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335

kernel-debug-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81b43bab9d6afe2ae11d120555319a1de949c89caa21f493e9ba6dd235df0224

kernel-debug-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: c4e421d019878ab2503c0b71e6ce8a2834d536b27bcb675c8f84f79e50dcbdad

kernel-debug-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 576e5784f26b67b5b9efb32d11567a4c67200a22b8c4d0e509cac57397250171

kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068

kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008

kernel-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 8caab24414fe759d404ebb7303b251aff61a6c8ab9f471df5eb95475a1fd98ed

kernel-doc-4.18.0-305.86.2.el8_4.noarch.rpm

SHA-256: 94fa44b6cc94ff4cbb2bd03bfa1c770d461a280ce4945763af6519d810b0b35b

kernel-headers-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2014e6064b334740b6d6cd54417901122198ea5cb0ae50a904861d5df9c18df4

kernel-modules-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 298e46e11943c45dbadd02d21b800e7eab30c937c94bd98509c851dd586841df

kernel-modules-extra-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 34ef8d133aba7c88a780f1a6090ddc403086a6e2800dba93296f1e2f21d0aac5

kernel-tools-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 082d05cc2283bd6d0f5ff5fe5b149b318bdd969d45335cc6af9b49755a664937

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc

kernel-tools-libs-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: b49f6a96c69c49b20a09a8e2b02198fa16c8613832af7f7678032878a7f4c50f

perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 94a6a58903650fb58ae36d9e4b6d706fab22eedca37450ac7df9983a68b11649

perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3

python3-perf-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: d0401819f0671017663b8872bc5cc4acb53a215dd145b234a1880da9fd96d91b

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 825961cea022a6169fdf96ce7fc367b3403ea6a2ca096056d31c0fe4deece373

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2630568653827c8e679f11fc8b649204ca4aaa27860de00b89b5401db9472335

kernel-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 78df412c767785eb9cf5b9930023e422fcde4e0814e609d47edfd2e6e1cc6068

kernel-debuginfo-common-x86_64-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 81e552e6cf45baaccfb70f1464b0a5608da2646a246c13819ecdb008c56f6008

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 2d470ab6977fa6df7e2ad377ac7f87578bf60bafef343a5ec2471494a99c48dc

kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: 7d4721526d06a2e03cfd06d3c6f5460c245ba39c9b83f8997882f016240f9f42

perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f118f264585ee7c0674c78cb209fb2ec6b05b9eaf4d70ad89fcbc92868b6e4f3

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.x86_64.rpm

SHA-256: f53adbcb6875fb8f33bfc4c53e231b4f953e93c5a7e9ef9d95cc91e98e3eab8b

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: b08586f54faa9f3f775f1f1192fc19d9fbbd36f8a0f836be89a3953964f6707b

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 0224ee90ffe0fdc55c574ee0855049f9d1cd42ab7247dee097a24cbdc27c0a48

kernel-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: d363b8fa276d2d2f4dc08db6c6072e51428c3ea6a3a6e91c8604c57be9f0e01d

kernel-debuginfo-common-ppc64le-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 198f545be675f2a116d67b76a9ff59811e071e233dd7a1424e7ba7189d325efc

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 58160d73e29801cb699da23f8943bdf5d59efcd38703fe86ac9dd18744b99529

kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fc8840dd3eeb0c01c1de5e15d1c084b1072ab948f171e18aecb01d1383d4f3c9

perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: 4f5132ee5886cc8ea10be05cd940e798c28f32fa7a0413fc79c82cd120931ab3

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.ppc64le.rpm

SHA-256: fa82fdb9fb616de8a88950cea07839faff114bdb2fc34c09a52bd8031b5eca31

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 9b1ab65a638b0c8632ac35ffb9ff49fea0262ffc40cfcc264db9697c5fd71bf3

kernel-debug-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 42ec74c874a2607beec5c107b94772e950bb51d932ca249f48474bf0b7bd5b69

kernel-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: e9485bdef897127b47278d9674617a0341d8370f56ece588e57ca74627ecd5b7

kernel-debuginfo-common-aarch64-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 0d5c1b365cff42d9f2b4f83a966e09c88fc3a9376b133827a2ff5a4375fa1e82

kernel-tools-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 2c0bff136263b7dfe0bf0adfa6829fa2c1552efeb6bd9518931c77dde1800ebf

kernel-tools-libs-devel-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: a2dceef315929b94aadfa95030cd58c3cdaad4c748243dc68fad97753348c54a

perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 9fd74c0966c79e11e30fe6b439ee1c02305e9aa755230fdbd6ec5a2b59af7112

python3-perf-debuginfo-4.18.0-305.86.2.el8_4.aarch64.rpm

SHA-256: 92f7adf77ea6cf11d67f604975ec01130ec0bf01a808e52767f73a7e1502b713

Related news

RHSA-2023:4125: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local ...

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Red Hat Security Advisory 2023-3490-01

Red Hat Security Advisory 2023-3490-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-3326-01

Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:3191: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-1390: A remote denial of service vu...

RHSA-2023:2736: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26341: A flaw was found in hw. This issue can cause AMD CPUs to transiently execute beyond unconditional direct branches. * CVE-2021-33655: An out-of-bounds write flaw was found in the Linux kernel’s framebuffer-based console driver functionality in the way a user triggers ioctl FBIOPUT_VSCREENINFO with malicious data. This flaw allows a local user t...

Red Hat Security Advisory 2023-2148-01

Red Hat Security Advisory 2023-2148-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, bypass, denial of service, double free, memory leak, null pointer, out of bounds read, privilege escalation, traversal, and use-after-free vulnerabilities.

Red Hat Security Advisory 2023-2104-01

Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-1953-01

Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.

Red Hat Security Advisory 2023-1923-01

Red Hat Security Advisory 2023-1923-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-6030-1

Ubuntu Security Notice 6030-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.

Red Hat Security Advisory 2023-1841-01

Red Hat Security Advisory 2023-1841-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1656-01

Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.

Red Hat Security Advisory 2023-1660-01

Red Hat Security Advisory 2023-1660-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:1659: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux So...

RHSA-2023:1660: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem. * CVE...

Red Hat Security Advisory 2023-1556-01

Red Hat Security Advisory 2023-1556-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-1560-01

Red Hat Security Advisory 2023-1560-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.

RHSA-2023:1560: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2023-0266: A us...

RHSA-2023:1556: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue. * CVE-2023-0461: A use-after-free flaw was found in the Linux kernel’s TLS protocol functionality in how a user installs a tls context (struct tls_context...

Ubuntu Security Notice USN-5991-1

Ubuntu Security Notice 5991-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.

Google: Commercial Spyware Used by Governments Laden With Zero-Day Exploits

Google TAG researchers reveal two campaigns against iOS, Android, and Chrome users that demonstrate how the commercial surveillance market is thriving despite government-imposed limits.

Red Hat Security Advisory 2023-1471-01

Red Hat Security Advisory 2023-1471-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a double free vulnerability.

RHSA-2023:1471: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4744: A double-free flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in the...

Ubuntu Security Notice USN-5970-1

Ubuntu Security Notice 5970-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5951-1

Ubuntu Security Notice 5951-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5950-1

Ubuntu Security Notice 5950-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2023:1202: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...

Ubuntu Security Notice USN-5941-1

Ubuntu Security Notice 5941-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5940-1

Ubuntu Security Notice 5940-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5939-1

Ubuntu Security Notice 5939-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5938-1

Ubuntu Security Notice 5938-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5925-1

Ubuntu Security Notice 5925-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the Kernel Connection Multiplexor socket implementation in the Linux kernel when releasing sockets in certain situations. A local attacker could use this to cause a denial of service.

Ubuntu Security Notice USN-5920-1

Ubuntu Security Notice 5920-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5919-1

Ubuntu Security Notice 5919-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5911-1

Ubuntu Security Notice 5911-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5912-1

Ubuntu Security Notice 5912-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2023-0461

There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c

Ubuntu Security Notice USN-5883-1

Ubuntu Security Notice 5883-1 - Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

CVE-2023-0266: ALSA: control: code refactoring for ELEM_READ/ELEM_WRITE operations · torvalds/linux@becf9e5

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e