Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5316: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function
  • CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Data
#vulnerability#linux#red_hat#kubernetes#intel#buffer_overflow#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
  • kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • weird port mapping with asymmetric traffic (BZ#2065266)
  • HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644)
  • openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476)
  • sctp connection abort unexpected. (BZ#2070959)
  • soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713)
  • VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221)
  • SR-IOV performance > 50% degradation (BZ#2074829)
  • Call trace with parallel rules insertion and deletion (BZ#2075553)
  • Enable nested virtualization (BZ#2079069)
  • iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433)
  • WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856)
  • mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918)
  • OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071)
  • TCP doesn’t retransmit if in reorder state and waits for RTO (BZ#2080972)
  • pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998)
  • BlueField2: DPU can’t switch to switchdev mode (BZ#2081011)
  • Important ice bug fixes (BZ#2081794)
  • For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138)
  • Host is getting crash/abrupt reboot while the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572)
  • s_pf0vf2: hw csum failure for mlx5 (BZ#2086549)
  • kernel memory leak while freeing nested actions (BZ#2086590)
  • Regression: Bluetooth will not activate after 8.5 update (BZ#2087641)
  • mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain > 0 when internal port is the vtep device. (BZ#2088610)
  • rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611)
  • TTL decrease only on the first packet (BZ#2088638)
  • TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639)
  • Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 1899177 - CVE-2020-28915 kernel: out-of-bounds read in fbcon_get_font function
  • BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

x86_64

bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: c585ee903e9a6a9943bcc237e9ad5e82799f1dbf22db8f9630f0aca1e33efb91

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9083fb4b7f145729e7fc079b74f13f8c0ae1e06e61376b55c72b2540589a1801

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: bde35ba2d9be5b0ad989bf647cfb82f832049af9366bc2059fc37e30fb9153b9

kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: cc63daff809aa3d97fa66dff3737a4d5f34652673fa7a654003d24a623bcaeab

kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 99d8209e08e566a148874ef29e9baebb3fee7fcc28cee7c7ba51dd23dc18194f

kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: d06fa4c92ee79e40962318f3a2c5755197b07e0a579b3c32ab9abaa3b6b14cb1

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1b9d8e329c9a20752f8c10e972d6500bc46e839c241add81cdbf39193659ddae

kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 6ca8659f321e6f56bd4bbd0755aaef26fc93d1be8527a3cb0331edd6bbb57e3f

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: b9839b367c04187f38d74c9698a6dcc778e3a215b21eeaa477d812b6d26443a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e3ed6ec235c7a58595fddb261d1254e51a7d710804f243815ebdaa4430e96525

kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: f9a8313a00f1595aa17e979544624a1304a18e17c2dbaa990068b9d2daf27b10

kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 8ecb4ad464929c2d8f8e8bdc2cbed82d55713c1d7ee39e025b3c177d94a56619

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1161cea16b3792c9b650154a96c8518a2faa63a24af6571ad48d70ae788cd71c

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9602a18686904a94c90f6282a4858996c2ecade5fe3998994b46884dc77e35cc

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

x86_64

bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: c585ee903e9a6a9943bcc237e9ad5e82799f1dbf22db8f9630f0aca1e33efb91

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9083fb4b7f145729e7fc079b74f13f8c0ae1e06e61376b55c72b2540589a1801

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: bde35ba2d9be5b0ad989bf647cfb82f832049af9366bc2059fc37e30fb9153b9

kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: cc63daff809aa3d97fa66dff3737a4d5f34652673fa7a654003d24a623bcaeab

kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 99d8209e08e566a148874ef29e9baebb3fee7fcc28cee7c7ba51dd23dc18194f

kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: d06fa4c92ee79e40962318f3a2c5755197b07e0a579b3c32ab9abaa3b6b14cb1

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1b9d8e329c9a20752f8c10e972d6500bc46e839c241add81cdbf39193659ddae

kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 6ca8659f321e6f56bd4bbd0755aaef26fc93d1be8527a3cb0331edd6bbb57e3f

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: b9839b367c04187f38d74c9698a6dcc778e3a215b21eeaa477d812b6d26443a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e3ed6ec235c7a58595fddb261d1254e51a7d710804f243815ebdaa4430e96525

kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: f9a8313a00f1595aa17e979544624a1304a18e17c2dbaa990068b9d2daf27b10

kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 8ecb4ad464929c2d8f8e8bdc2cbed82d55713c1d7ee39e025b3c177d94a56619

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1161cea16b3792c9b650154a96c8518a2faa63a24af6571ad48d70ae788cd71c

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9602a18686904a94c90f6282a4858996c2ecade5fe3998994b46884dc77e35cc

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

s390x

bpftool-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b4ef4598e1ba01ea060a1b71dd158f11cad159ec07db4197e4f62975b0f1bdc7

bpftool-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 7b5a4d8d09ca90b726b805eb4335a75b993068c6bf3ba297db98446656337d3d

kernel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: ea8a2b5cd687affd21e5e84c98d1cb1aafe9b47734230d1611a77657b5430194

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 5737d4025aefc7ebeeccafc90866199a5f9ee4ba9daaa972e92751135a5628c2

kernel-cross-headers-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 963b6448fc137b3780f0c1d5ae14ccdc802ca2691a836e07aaabe3a94da5d2d1

kernel-debug-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 16f01ce0880680da6f5dc3d40dbb821bc076e116bfdaaee8e8730c7e6e3e653a

kernel-debug-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b29fc71f2cffdf38ef9f9476959c58fa0b0aba3e2f825c9d22cde183b2dfa9c5

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4bd52ef10389ca195c8694b70165f0bb4e53111e1dcf54a9d1babd4a25e16522

kernel-debug-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 43cf419b91fe81beb729685752285060bfbbd72f45a2c68bf73095914b0fb8be

kernel-debug-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: c119634c2a8f573d7d5bb327cd91d3af6bbea1a0cfb1820211cc05d649c0406d

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4de020f0f40bf87e00afc55210a5a0f36acaef303430695f71464f1b4fd3e8a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 094421ac2f006ca87c43d3db643a10300d9831caca141277b727205b9f81c8dd

kernel-debuginfo-common-s390x-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 9ff6e091846eb353263223ebd5016f9e2a595aadf91018b81115cbe7e64a45af

kernel-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b3d2557e78b4c3d6bb4473ecb4dfe8bb27aa3ce8305933fe4a297a4fe82402c2

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4d4ca3d96533db3d49918a7bfbc32410a7f6b8b5fe6b7530d70d1609a4f4a8d4

kernel-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 1e2deb0ebf3eda988a24eefd60aaf6917b63b289159698a32cae599c296a69f5

kernel-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 8a9e51047cc3c2fe7d434d0b30cc13e2c22bb628b8c04ed5159b49f98d452135

kernel-tools-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 251c19df3e0e8d7a49c6eaedcf02a2f306c645540b971374b93ca81d4d428a42

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: aa2c9d52fd544af5d6656413d17f65e2c4ee80a5fc9ee296e4fe88f1586c5c1b

kernel-zfcpdump-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 3de95cba7a491b50558718d0ac4cde8d120ac8d2cd722bf05a6b2ee50a7d405b

kernel-zfcpdump-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 9dce1d7464ba72a44b494461af0617cc73bf23428929309caf5ac4eab1d2c816

kernel-zfcpdump-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: f597a14568d0a2ce3ff53c8fe163611fb68829dee775af517f69664cc1328b1f

kernel-zfcpdump-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 25397b3d8fbda36d79587bfa67828bce16d0f4ad8bd34f9700a6e8d22c1aa2f3

kernel-zfcpdump-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: e342bdfcd5f85fe24418b4ea715ce9788e9b9b477989f0fce2fc6903b5449892

kernel-zfcpdump-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b40f7cd9c8d9e55c4e4e8d064391bea5970f3f7a9ef4cb55a38f1c2654d2d526

perf-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: fdb02457ad8f02bb017c9d14197abf8b3bc0e75852dd6ed10db9572c753bce7c

perf-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: e35c11a076f27ec0feaf297f7dfc77034d0b1be18ff660430bd875b79cb34b88

python3-perf-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 0759cd040c9166352b446a22ce8afa3bbc24d9ea8afb1e41b5911a1f7a28de34

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: ae5915c5f6f4aba772fce58f30c7629bab082e0c7cb3666237cdec1437d2b1d6

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

s390x

bpftool-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b4ef4598e1ba01ea060a1b71dd158f11cad159ec07db4197e4f62975b0f1bdc7

bpftool-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 7b5a4d8d09ca90b726b805eb4335a75b993068c6bf3ba297db98446656337d3d

kernel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: ea8a2b5cd687affd21e5e84c98d1cb1aafe9b47734230d1611a77657b5430194

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 5737d4025aefc7ebeeccafc90866199a5f9ee4ba9daaa972e92751135a5628c2

kernel-cross-headers-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 963b6448fc137b3780f0c1d5ae14ccdc802ca2691a836e07aaabe3a94da5d2d1

kernel-debug-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 16f01ce0880680da6f5dc3d40dbb821bc076e116bfdaaee8e8730c7e6e3e653a

kernel-debug-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b29fc71f2cffdf38ef9f9476959c58fa0b0aba3e2f825c9d22cde183b2dfa9c5

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4bd52ef10389ca195c8694b70165f0bb4e53111e1dcf54a9d1babd4a25e16522

kernel-debug-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 43cf419b91fe81beb729685752285060bfbbd72f45a2c68bf73095914b0fb8be

kernel-debug-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: c119634c2a8f573d7d5bb327cd91d3af6bbea1a0cfb1820211cc05d649c0406d

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4de020f0f40bf87e00afc55210a5a0f36acaef303430695f71464f1b4fd3e8a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 094421ac2f006ca87c43d3db643a10300d9831caca141277b727205b9f81c8dd

kernel-debuginfo-common-s390x-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 9ff6e091846eb353263223ebd5016f9e2a595aadf91018b81115cbe7e64a45af

kernel-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b3d2557e78b4c3d6bb4473ecb4dfe8bb27aa3ce8305933fe4a297a4fe82402c2

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 4d4ca3d96533db3d49918a7bfbc32410a7f6b8b5fe6b7530d70d1609a4f4a8d4

kernel-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 1e2deb0ebf3eda988a24eefd60aaf6917b63b289159698a32cae599c296a69f5

kernel-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 8a9e51047cc3c2fe7d434d0b30cc13e2c22bb628b8c04ed5159b49f98d452135

kernel-tools-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 251c19df3e0e8d7a49c6eaedcf02a2f306c645540b971374b93ca81d4d428a42

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: aa2c9d52fd544af5d6656413d17f65e2c4ee80a5fc9ee296e4fe88f1586c5c1b

kernel-zfcpdump-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 3de95cba7a491b50558718d0ac4cde8d120ac8d2cd722bf05a6b2ee50a7d405b

kernel-zfcpdump-core-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 9dce1d7464ba72a44b494461af0617cc73bf23428929309caf5ac4eab1d2c816

kernel-zfcpdump-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: f597a14568d0a2ce3ff53c8fe163611fb68829dee775af517f69664cc1328b1f

kernel-zfcpdump-devel-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 25397b3d8fbda36d79587bfa67828bce16d0f4ad8bd34f9700a6e8d22c1aa2f3

kernel-zfcpdump-modules-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: e342bdfcd5f85fe24418b4ea715ce9788e9b9b477989f0fce2fc6903b5449892

kernel-zfcpdump-modules-extra-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: b40f7cd9c8d9e55c4e4e8d064391bea5970f3f7a9ef4cb55a38f1c2654d2d526

perf-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: fdb02457ad8f02bb017c9d14197abf8b3bc0e75852dd6ed10db9572c753bce7c

perf-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: e35c11a076f27ec0feaf297f7dfc77034d0b1be18ff660430bd875b79cb34b88

python3-perf-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: 0759cd040c9166352b446a22ce8afa3bbc24d9ea8afb1e41b5911a1f7a28de34

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.s390x.rpm

SHA-256: ae5915c5f6f4aba772fce58f30c7629bab082e0c7cb3666237cdec1437d2b1d6

Red Hat Enterprise Linux for Power, little endian 8

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

ppc64le

bpftool-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 433ab3f257e219c73ac68cb889f72dd8b322d715feb8b8732520edc79398798d

bpftool-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2eac6bc24433c137fc4c1e40ed178417dd5bd65cd40c7e2a3df9fff082a8333b

kernel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5fae9ff16a8124a0559cfb9db07aecd0991a1830c4439b1460118f2667f8f6de

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 507e9612522e6da050159571decc960a7c9498877284cb27f86c3aff26975b6c

kernel-cross-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 10024818d10b730e4e1bf1eacc4e1632f54e2e3798e95b48abce1674efa24424

kernel-debug-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: c6e10b71823c2b74502796a17b68b0bb9fe5060082a78ac2761b31e732a4581b

kernel-debug-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a08e776ca88f7033ab936ee13be9872f8e5eb75f506e72b9c5394582e1d8a3d9

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: b1714cbee0d74e91ac958a2db15f5a8f31d52a9fd6876dc7e2fe69c0e0bc4612

kernel-debug-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 6dc923afc8c1e3c047ec67dedc423fed236384d4f6f4019809dc4c220b550f44

kernel-debug-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 0f9a34eda74e632999a8f8a9673d15a9b14e411549ed42c4c714c6e09fefd6d2

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fd45063ed8b5b22a693c012dc3d6c5fc19b7d0765c069b881fa081b99ce78d86

kernel-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2aa98af31dde44a9233ccbb212ad45080bb37b9368df018c72079d6304cda958

kernel-debuginfo-common-ppc64le-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d671e5a3f36f2a959a45e9095889713d8ae2f8a768f0069832fb4ae7f6fdd613

kernel-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 3a4d8345f57c7ac08d6456655b2ad9196123a4abb9eb3cd98bdf2d10a6d3c0fe

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 362f2a4a866e13ae39833afde4511a011a379afe391e5f2c4139164f98617bfb

kernel-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 159587073e5c7006dee9d2a4f99703a3280b70da1a809759fc529161c8f88b39

kernel-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: f337e1197c9a2b92300d2986aaec63278edcd154faab4ec016b354b92e2a5ebc

kernel-tools-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5018fac5418fcc7098ffb3acf89083194dc18a50267b8fb471c0e2f5a0be205d

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fa231e8717ac669b13dbe004fb96343214818bfb9e78a02af6c99a152c8c47c4

kernel-tools-libs-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a7dd40a902edfe35edf38d5b1e83a846d2e885438a692a05cbcc239adde76bbe

perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 9621f69bd714b12b910d691d37495f75d35343d84c2bb51c5083ff79d9d2cdae

perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5be649043c0e474cdf44fdb8ccd7e58ba55ca3a5e6fe6486aa01b0af6cdccbd6

python3-perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 83701b5fa638a343e5e50e741919475866e2b9b9bbc880c5b88160ca419bd330

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d017ccd83a740c3991f42de825ddfd266d5d5506474ec50b6c2e4520a04acd86

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

ppc64le

bpftool-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 433ab3f257e219c73ac68cb889f72dd8b322d715feb8b8732520edc79398798d

bpftool-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2eac6bc24433c137fc4c1e40ed178417dd5bd65cd40c7e2a3df9fff082a8333b

kernel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5fae9ff16a8124a0559cfb9db07aecd0991a1830c4439b1460118f2667f8f6de

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 507e9612522e6da050159571decc960a7c9498877284cb27f86c3aff26975b6c

kernel-cross-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 10024818d10b730e4e1bf1eacc4e1632f54e2e3798e95b48abce1674efa24424

kernel-debug-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: c6e10b71823c2b74502796a17b68b0bb9fe5060082a78ac2761b31e732a4581b

kernel-debug-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a08e776ca88f7033ab936ee13be9872f8e5eb75f506e72b9c5394582e1d8a3d9

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: b1714cbee0d74e91ac958a2db15f5a8f31d52a9fd6876dc7e2fe69c0e0bc4612

kernel-debug-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 6dc923afc8c1e3c047ec67dedc423fed236384d4f6f4019809dc4c220b550f44

kernel-debug-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 0f9a34eda74e632999a8f8a9673d15a9b14e411549ed42c4c714c6e09fefd6d2

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fd45063ed8b5b22a693c012dc3d6c5fc19b7d0765c069b881fa081b99ce78d86

kernel-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2aa98af31dde44a9233ccbb212ad45080bb37b9368df018c72079d6304cda958

kernel-debuginfo-common-ppc64le-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d671e5a3f36f2a959a45e9095889713d8ae2f8a768f0069832fb4ae7f6fdd613

kernel-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 3a4d8345f57c7ac08d6456655b2ad9196123a4abb9eb3cd98bdf2d10a6d3c0fe

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 362f2a4a866e13ae39833afde4511a011a379afe391e5f2c4139164f98617bfb

kernel-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 159587073e5c7006dee9d2a4f99703a3280b70da1a809759fc529161c8f88b39

kernel-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: f337e1197c9a2b92300d2986aaec63278edcd154faab4ec016b354b92e2a5ebc

kernel-tools-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5018fac5418fcc7098ffb3acf89083194dc18a50267b8fb471c0e2f5a0be205d

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fa231e8717ac669b13dbe004fb96343214818bfb9e78a02af6c99a152c8c47c4

kernel-tools-libs-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a7dd40a902edfe35edf38d5b1e83a846d2e885438a692a05cbcc239adde76bbe

perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 9621f69bd714b12b910d691d37495f75d35343d84c2bb51c5083ff79d9d2cdae

perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5be649043c0e474cdf44fdb8ccd7e58ba55ca3a5e6fe6486aa01b0af6cdccbd6

python3-perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 83701b5fa638a343e5e50e741919475866e2b9b9bbc880c5b88160ca419bd330

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d017ccd83a740c3991f42de825ddfd266d5d5506474ec50b6c2e4520a04acd86

Red Hat Virtualization Host 4 for RHEL 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat Enterprise Linux for x86_64 8

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

x86_64

bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: c585ee903e9a6a9943bcc237e9ad5e82799f1dbf22db8f9630f0aca1e33efb91

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9083fb4b7f145729e7fc079b74f13f8c0ae1e06e61376b55c72b2540589a1801

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: bde35ba2d9be5b0ad989bf647cfb82f832049af9366bc2059fc37e30fb9153b9

kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: cc63daff809aa3d97fa66dff3737a4d5f34652673fa7a654003d24a623bcaeab

kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 99d8209e08e566a148874ef29e9baebb3fee7fcc28cee7c7ba51dd23dc18194f

kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: d06fa4c92ee79e40962318f3a2c5755197b07e0a579b3c32ab9abaa3b6b14cb1

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1b9d8e329c9a20752f8c10e972d6500bc46e839c241add81cdbf39193659ddae

kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 6ca8659f321e6f56bd4bbd0755aaef26fc93d1be8527a3cb0331edd6bbb57e3f

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: b9839b367c04187f38d74c9698a6dcc778e3a215b21eeaa477d812b6d26443a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e3ed6ec235c7a58595fddb261d1254e51a7d710804f243815ebdaa4430e96525

kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: f9a8313a00f1595aa17e979544624a1304a18e17c2dbaa990068b9d2daf27b10

kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 8ecb4ad464929c2d8f8e8bdc2cbed82d55713c1d7ee39e025b3c177d94a56619

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1161cea16b3792c9b650154a96c8518a2faa63a24af6571ad48d70ae788cd71c

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9602a18686904a94c90f6282a4858996c2ecade5fe3998994b46884dc77e35cc

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

x86_64

bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: c585ee903e9a6a9943bcc237e9ad5e82799f1dbf22db8f9630f0aca1e33efb91

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9083fb4b7f145729e7fc079b74f13f8c0ae1e06e61376b55c72b2540589a1801

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: bde35ba2d9be5b0ad989bf647cfb82f832049af9366bc2059fc37e30fb9153b9

kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: cc63daff809aa3d97fa66dff3737a4d5f34652673fa7a654003d24a623bcaeab

kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 99d8209e08e566a148874ef29e9baebb3fee7fcc28cee7c7ba51dd23dc18194f

kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: d06fa4c92ee79e40962318f3a2c5755197b07e0a579b3c32ab9abaa3b6b14cb1

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1b9d8e329c9a20752f8c10e972d6500bc46e839c241add81cdbf39193659ddae

kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 6ca8659f321e6f56bd4bbd0755aaef26fc93d1be8527a3cb0331edd6bbb57e3f

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: b9839b367c04187f38d74c9698a6dcc778e3a215b21eeaa477d812b6d26443a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e3ed6ec235c7a58595fddb261d1254e51a7d710804f243815ebdaa4430e96525

kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: f9a8313a00f1595aa17e979544624a1304a18e17c2dbaa990068b9d2daf27b10

kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 8ecb4ad464929c2d8f8e8bdc2cbed82d55713c1d7ee39e025b3c177d94a56619

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1161cea16b3792c9b650154a96c8518a2faa63a24af6571ad48d70ae788cd71c

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9602a18686904a94c90f6282a4858996c2ecade5fe3998994b46884dc77e35cc

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat Enterprise Linux for ARM 64 8

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

aarch64

bpftool-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8cdbe6315477848974a8363f4e4883ebb3e541d3731c868816dd679f2cd6548b

bpftool-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8a448cdee50a11b58f63b3b61dbbe03dda6b5b4cd5e3f5e42f9398403922e661

kernel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 2dd580deb6707179e15b91ec9bf00c5400184c3faf35e9d9a9764247f0ff4b6d

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 56259a562d42ab8fb6348b371283b0fe560b3899cf9e4173940915f05716ff70

kernel-cross-headers-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: d29cca491c4a361627b883b60105dcc362eb6468085f8a1266817d3c086e1295

kernel-debug-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 326bee6e16c8fcf85fdea07a4848df8a0a0330b5672e62ecfe514c534fbf4caa

kernel-debug-core-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 5951516215016e718a0d1421a24aded43d91bf840343a33d46773f2627e246bd

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8e2fb1bc4b97d246a2da7df96268e8534936eb320f62b909534cf10d7752ef3a

kernel-debug-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: e5372d244ee42589f882d2f10089beff4a6a3876f48fe36db378b1c70c9777dd

kernel-debug-modules-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0865a7aaa466eb48af0a5e671c703a1379185af224ebf233857e167cfefa3037

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 5ff95ce9f6e08a73b13cd36cbe2fd63504b7d2c230bfc28ff049aa397f0e7558

kernel-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 155361d3c70dc73c1721a4941be263366f4794f80fd8348e0fc220a968452e4f

kernel-debuginfo-common-aarch64-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0d385404d38d097a613882be99784f4a186ae70228615f7fdee97d33510fc271

kernel-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 7fa29f166da1909dbe2e126d65fc5ac520386a40382bfa40a0f75224942d0c91

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 6a70093cb2ccfbf16df04f057a27c11ebc9d960a2349f37e4d147bdd0c3b53be

kernel-modules-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: aeaa5363d660f21886b51fc9edde786b4b5debeaadfb1c5a4c7a12fef69d93a8

kernel-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: c39bc4661b33363e47f216338ee6bea4de6006c16541996fd1ba6e61b2f6177f

kernel-tools-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 7a299910f2cb00c8fc95dd22bd195e4633b185f4e608d96aa3125c6c9977fbd2

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 79aab6c7fef99c28156a5ad98df36b578ee8f670f97a18c9ac8d5995bea16936

kernel-tools-libs-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: c5703d85513f577185bcfa87c64fb72dd50c1ff1a0826c783512bb52eb1d67a4

perf-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 6bb4cc17b39b47ca5733ebe471351a26d7beb6f6c37304a0993f30e955371f69

perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0a5c96946f3ea63fca2f8d2d860dc8bb166f1bbaf067ec37a629537e37a21085

python3-perf-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 4b39530aa0efdebaeb015ed04e78ea0ab5ac2deb24a2e125afa4241990d469e9

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 25dbbb77299f58f0c6d05f0e6949492f98232160e8afcf9f85e54b3339a7e0cf

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

ppc64le

bpftool-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 433ab3f257e219c73ac68cb889f72dd8b322d715feb8b8732520edc79398798d

bpftool-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2eac6bc24433c137fc4c1e40ed178417dd5bd65cd40c7e2a3df9fff082a8333b

kernel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5fae9ff16a8124a0559cfb9db07aecd0991a1830c4439b1460118f2667f8f6de

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 507e9612522e6da050159571decc960a7c9498877284cb27f86c3aff26975b6c

kernel-cross-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 10024818d10b730e4e1bf1eacc4e1632f54e2e3798e95b48abce1674efa24424

kernel-debug-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: c6e10b71823c2b74502796a17b68b0bb9fe5060082a78ac2761b31e732a4581b

kernel-debug-core-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a08e776ca88f7033ab936ee13be9872f8e5eb75f506e72b9c5394582e1d8a3d9

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: b1714cbee0d74e91ac958a2db15f5a8f31d52a9fd6876dc7e2fe69c0e0bc4612

kernel-debug-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 6dc923afc8c1e3c047ec67dedc423fed236384d4f6f4019809dc4c220b550f44

kernel-debug-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 0f9a34eda74e632999a8f8a9673d15a9b14e411549ed42c4c714c6e09fefd6d2

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fd45063ed8b5b22a693c012dc3d6c5fc19b7d0765c069b881fa081b99ce78d86

kernel-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2aa98af31dde44a9233ccbb212ad45080bb37b9368df018c72079d6304cda958

kernel-debuginfo-common-ppc64le-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d671e5a3f36f2a959a45e9095889713d8ae2f8a768f0069832fb4ae7f6fdd613

kernel-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 3a4d8345f57c7ac08d6456655b2ad9196123a4abb9eb3cd98bdf2d10a6d3c0fe

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 362f2a4a866e13ae39833afde4511a011a379afe391e5f2c4139164f98617bfb

kernel-modules-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 159587073e5c7006dee9d2a4f99703a3280b70da1a809759fc529161c8f88b39

kernel-modules-extra-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: f337e1197c9a2b92300d2986aaec63278edcd154faab4ec016b354b92e2a5ebc

kernel-tools-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5018fac5418fcc7098ffb3acf89083194dc18a50267b8fb471c0e2f5a0be205d

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fa231e8717ac669b13dbe004fb96343214818bfb9e78a02af6c99a152c8c47c4

kernel-tools-libs-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: a7dd40a902edfe35edf38d5b1e83a846d2e885438a692a05cbcc239adde76bbe

perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 9621f69bd714b12b910d691d37495f75d35343d84c2bb51c5083ff79d9d2cdae

perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5be649043c0e474cdf44fdb8ccd7e58ba55ca3a5e6fe6486aa01b0af6cdccbd6

python3-perf-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 83701b5fa638a343e5e50e741919475866e2b9b9bbc880c5b88160ca419bd330

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d017ccd83a740c3991f42de825ddfd266d5d5506474ec50b6c2e4520a04acd86

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

x86_64

bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: c585ee903e9a6a9943bcc237e9ad5e82799f1dbf22db8f9630f0aca1e33efb91

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9083fb4b7f145729e7fc079b74f13f8c0ae1e06e61376b55c72b2540589a1801

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: bde35ba2d9be5b0ad989bf647cfb82f832049af9366bc2059fc37e30fb9153b9

kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: cc63daff809aa3d97fa66dff3737a4d5f34652673fa7a654003d24a623bcaeab

kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 99d8209e08e566a148874ef29e9baebb3fee7fcc28cee7c7ba51dd23dc18194f

kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: d06fa4c92ee79e40962318f3a2c5755197b07e0a579b3c32ab9abaa3b6b14cb1

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1b9d8e329c9a20752f8c10e972d6500bc46e839c241add81cdbf39193659ddae

kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 6ca8659f321e6f56bd4bbd0755aaef26fc93d1be8527a3cb0331edd6bbb57e3f

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: b9839b367c04187f38d74c9698a6dcc778e3a215b21eeaa477d812b6d26443a3

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1ad1f2c92f46f42aaa60b31c683b6b33d0c00d764a660e2ac2c7e595d558b060

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 7b63e38b0f47f8a3f33003ce7c6de8fd437659af8531d5b53cb6109d412d196e

kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e3ed6ec235c7a58595fddb261d1254e51a7d710804f243815ebdaa4430e96525

kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: f9a8313a00f1595aa17e979544624a1304a18e17c2dbaa990068b9d2daf27b10

kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 8ecb4ad464929c2d8f8e8bdc2cbed82d55713c1d7ee39e025b3c177d94a56619

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 1161cea16b3792c9b650154a96c8518a2faa63a24af6571ad48d70ae788cd71c

perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 44bdb43397cdd193f1acb9b35c24be6ebf4a0458131318aed60482b75d80588b

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 9602a18686904a94c90f6282a4858996c2ecade5fe3998994b46884dc77e35cc

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat CodeReady Linux Builder for x86_64 8

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: ff5829d4b24c077d7f21ed9a28d3d4b00b15029e1b736867a9bd2d81894c68e6

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2eac6bc24433c137fc4c1e40ed178417dd5bd65cd40c7e2a3df9fff082a8333b

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: b1714cbee0d74e91ac958a2db15f5a8f31d52a9fd6876dc7e2fe69c0e0bc4612

kernel-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2aa98af31dde44a9233ccbb212ad45080bb37b9368df018c72079d6304cda958

kernel-debuginfo-common-ppc64le-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d671e5a3f36f2a959a45e9095889713d8ae2f8a768f0069832fb4ae7f6fdd613

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fa231e8717ac669b13dbe004fb96343214818bfb9e78a02af6c99a152c8c47c4

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 727900d28c4d175ed165abe40d65f57851c90a14223a4a20074f737e288dc7dd

perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5be649043c0e474cdf44fdb8ccd7e58ba55ca3a5e6fe6486aa01b0af6cdccbd6

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d017ccd83a740c3991f42de825ddfd266d5d5506474ec50b6c2e4520a04acd86

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8a448cdee50a11b58f63b3b61dbbe03dda6b5b4cd5e3f5e42f9398403922e661

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8e2fb1bc4b97d246a2da7df96268e8534936eb320f62b909534cf10d7752ef3a

kernel-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 155361d3c70dc73c1721a4941be263366f4794f80fd8348e0fc220a968452e4f

kernel-debuginfo-common-aarch64-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0d385404d38d097a613882be99784f4a186ae70228615f7fdee97d33510fc271

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 79aab6c7fef99c28156a5ad98df36b578ee8f670f97a18c9ac8d5995bea16936

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: fa22969eefd99a28b786b04102e28a8f206a9690425fb00c6eb05df86ccbca06

perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0a5c96946f3ea63fca2f8d2d860dc8bb166f1bbaf067ec37a629537e37a21085

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 25dbbb77299f58f0c6d05f0e6949492f98232160e8afcf9f85e54b3339a7e0cf

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

kernel-4.18.0-372.13.1.el8_6.src.rpm

SHA-256: be728c2ef9ac2e68fc0838db7e7b655a7ef2767227a4bdfd165f33a270446793

aarch64

bpftool-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8cdbe6315477848974a8363f4e4883ebb3e541d3731c868816dd679f2cd6548b

bpftool-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8a448cdee50a11b58f63b3b61dbbe03dda6b5b4cd5e3f5e42f9398403922e661

kernel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 2dd580deb6707179e15b91ec9bf00c5400184c3faf35e9d9a9764247f0ff4b6d

kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: 91690090ecf23a39416a3d4aa67f18469e0515038359d494bcb06e376899e303

kernel-core-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 56259a562d42ab8fb6348b371283b0fe560b3899cf9e4173940915f05716ff70

kernel-cross-headers-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: d29cca491c4a361627b883b60105dcc362eb6468085f8a1266817d3c086e1295

kernel-debug-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 326bee6e16c8fcf85fdea07a4848df8a0a0330b5672e62ecfe514c534fbf4caa

kernel-debug-core-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 5951516215016e718a0d1421a24aded43d91bf840343a33d46773f2627e246bd

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8e2fb1bc4b97d246a2da7df96268e8534936eb320f62b909534cf10d7752ef3a

kernel-debug-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: e5372d244ee42589f882d2f10089beff4a6a3876f48fe36db378b1c70c9777dd

kernel-debug-modules-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0865a7aaa466eb48af0a5e671c703a1379185af224ebf233857e167cfefa3037

kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 5ff95ce9f6e08a73b13cd36cbe2fd63504b7d2c230bfc28ff049aa397f0e7558

kernel-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 155361d3c70dc73c1721a4941be263366f4794f80fd8348e0fc220a968452e4f

kernel-debuginfo-common-aarch64-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0d385404d38d097a613882be99784f4a186ae70228615f7fdee97d33510fc271

kernel-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 7fa29f166da1909dbe2e126d65fc5ac520386a40382bfa40a0f75224942d0c91

kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm

SHA-256: bb9f50aa43f3cf76c5f5da6334eaa210fa0828cdc5cd8e813db5cf83674ca3cd

kernel-headers-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 6a70093cb2ccfbf16df04f057a27c11ebc9d960a2349f37e4d147bdd0c3b53be

kernel-modules-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: aeaa5363d660f21886b51fc9edde786b4b5debeaadfb1c5a4c7a12fef69d93a8

kernel-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: c39bc4661b33363e47f216338ee6bea4de6006c16541996fd1ba6e61b2f6177f

kernel-tools-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 7a299910f2cb00c8fc95dd22bd195e4633b185f4e608d96aa3125c6c9977fbd2

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 79aab6c7fef99c28156a5ad98df36b578ee8f670f97a18c9ac8d5995bea16936

kernel-tools-libs-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: c5703d85513f577185bcfa87c64fb72dd50c1ff1a0826c783512bb52eb1d67a4

perf-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 6bb4cc17b39b47ca5733ebe471351a26d7beb6f6c37304a0993f30e955371f69

perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0a5c96946f3ea63fca2f8d2d860dc8bb166f1bbaf067ec37a629537e37a21085

python3-perf-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 4b39530aa0efdebaeb015ed04e78ea0ab5ac2deb24a2e125afa4241990d469e9

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 25dbbb77299f58f0c6d05f0e6949492f98232160e8afcf9f85e54b3339a7e0cf

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM

x86_64

bpftool-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: a5c2f461163f5ff1cf4c8fdf1fb6f7652ddb895ff471a5970f593f4f9652cc84

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e50e7a26b2e38558b69021823b82062df73f00bf02b92ee6129cdfa38390e519

kernel-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 115adb7adb22d595a865fd67490de193dbff1040139fb86b4033ae9de7fb6e69

kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 59e65d5627580dc8308d4f67a4fa6f86d6fb610a9640c1b440e573a5111e5e9f

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 5fc684d9cfe7d891676ab10eb846f74e4e3d3e1ff99a693f17e4f10cf3b3733b

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: ff5829d4b24c077d7f21ed9a28d3d4b00b15029e1b736867a9bd2d81894c68e6

perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: e8138b30f52bbc554efb949e9dc9b50f1984309e4526e0a6b25f779c99b7709d

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.x86_64.rpm

SHA-256: 625f53462c3ce4b23df28c6f9d1d6228a079eb5c1aef02433c39d708cd1ce920

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM

ppc64le

bpftool-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2eac6bc24433c137fc4c1e40ed178417dd5bd65cd40c7e2a3df9fff082a8333b

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: b1714cbee0d74e91ac958a2db15f5a8f31d52a9fd6876dc7e2fe69c0e0bc4612

kernel-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 2aa98af31dde44a9233ccbb212ad45080bb37b9368df018c72079d6304cda958

kernel-debuginfo-common-ppc64le-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d671e5a3f36f2a959a45e9095889713d8ae2f8a768f0069832fb4ae7f6fdd613

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: fa231e8717ac669b13dbe004fb96343214818bfb9e78a02af6c99a152c8c47c4

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 727900d28c4d175ed165abe40d65f57851c90a14223a4a20074f737e288dc7dd

perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: 5be649043c0e474cdf44fdb8ccd7e58ba55ca3a5e6fe6486aa01b0af6cdccbd6

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.ppc64le.rpm

SHA-256: d017ccd83a740c3991f42de825ddfd266d5d5506474ec50b6c2e4520a04acd86

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM

aarch64

bpftool-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8a448cdee50a11b58f63b3b61dbbe03dda6b5b4cd5e3f5e42f9398403922e661

kernel-debug-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 8e2fb1bc4b97d246a2da7df96268e8534936eb320f62b909534cf10d7752ef3a

kernel-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 155361d3c70dc73c1721a4941be263366f4794f80fd8348e0fc220a968452e4f

kernel-debuginfo-common-aarch64-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0d385404d38d097a613882be99784f4a186ae70228615f7fdee97d33510fc271

kernel-tools-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 79aab6c7fef99c28156a5ad98df36b578ee8f670f97a18c9ac8d5995bea16936

kernel-tools-libs-devel-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: fa22969eefd99a28b786b04102e28a8f206a9690425fb00c6eb05df86ccbca06

perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 0a5c96946f3ea63fca2f8d2d860dc8bb166f1bbaf067ec37a629537e37a21085

python3-perf-debuginfo-4.18.0-372.13.1.el8_6.aarch64.rpm

SHA-256: 25dbbb77299f58f0c6d05f0e6949492f98232160e8afcf9f85e54b3339a7e0cf

Related news

CVE-2023-33953: Security Bulletins

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...

Red Hat Security Advisory 2022-6696-01

Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.

CVE-2022-1941: Security Bulletins  |  Customer Care  |  Google Cloud

A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Red Hat Security Advisory 2022-5840-01

Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

RHSA-2022:5840: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1365: cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-28327: golang: crypto/elliptic: panic caused by oversized scalar * CVE-2022-29526: golang: syscall: faccessat checks wrong group

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5556-01

Red Hat Security Advisory 2022-5556-01 - Logging Subsystem 5.4.3 has security updates. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:5678: Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.1]

An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code * CVE-2022-28733: grub2: Integer underflow in grub_net_recv_ip4_packets

RHSA-2022:5556: Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update

Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

RHSA-2022:5476: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-5344-01

Red Hat Security Advisory 2022-5344-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5219-01

Red Hat Security Advisory 2022-5219-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

RHSA-2022:5344: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5219: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-4942-01

Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4924-01

Red Hat Security Advisory 2022-4924-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.

RHSA-2022:4924: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-4835-01

Red Hat Security Advisory 2022-4835-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4829-01

Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.

Red Hat Security Advisory 2022-4809-01

Red Hat Security Advisory 2022-4809-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.

RHSA-2022:4829: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code