Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:0496: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.
  • CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
  • kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • fix for “CoW after fork() issue” aka “vmsplice child -> parent attack” aka “GUP after fork bug” (BZ#2137547)
  • After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138207)
  • i40e sriov virtual functions not created (BZ#2140103)
  • net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142019)
  • HPE: Premature swapping with swappiness=0 while there’s still plenty of pagecache to be reclaimed. (BZ#2151634)
  • The “kernel BUG at mm/usercopy.c:103!” from BZ 2041529 is back on rhel-8.5 (BZ#2153232)
  • Azure: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155274)
  • Azure: VM Deployment Failures Patch Request (BZ#2155282)
  • RHEL 8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157924)
  • RHEL 8.5: Backport upstream memory cgroup commits up to v5.12 (BZ#2158049)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2067482 - CVE-2022-2964 kernel: memory corruption in AX88179_178A based USB ethernet device.
  • BZ - 2147572 - CVE-2022-4139 kernel: i915: Incorrect GPU TLB flush can lead to random memory access

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

x86_64

bpftool-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b2b3562c70d51d0daec4e21e6b069cb2ee86bcdcf28bab05ad510c182ff0903f

bpftool-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: e602471560c8c7150923d47753574aaf03c2edfbcddb0c392aa6e549fa00c462

kernel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 39dfaff5588f5076eede53d9dc2b1b3e11b9db78b8b50c345ff3742b9e6e14ad

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 641e4ac4c935bf8dff76327ef2c3daf81098361f3b28d4cf2d6caa9339cbaebb

kernel-cross-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d472e2e103ba08d641fb7332a3ea51f36934710ca9ad2fe2e9b3fffdf0df738

kernel-debug-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 167ba2533b8feb62e1a91d838b09ac059e513ba3594b040775e9b75ee71bd2fe

kernel-debug-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 9c496626a9822e9c3ec1628b2d37c1c16a66666b0227fabd002102446aa42377

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 96a17a13332c365c70e58db6fa25b38d5990ec38ba1f8b09af6d3b653f852008

kernel-debug-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 95c0c19f4690c6817df6e755e0ce25f345afe5963345c80f9dee900501c08947

kernel-debug-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a618186732872c028759658616eabed69502c0c68e2c22c7e132475391baf8c

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 7371b1a69136971994403e75ac1ff73302be665a307cb0b9b5489d1b476a907f

kernel-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: ffe8e63719b3647dc8a7ac95f89506160c94e27d06878231f5b0aca144fbc569

kernel-debuginfo-common-x86_64-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1de76cdea022086c86a1a6dcfd904cb5d7764262d19d9b29a38adb10ba901599

kernel-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 8a4ffd6018b0db5cacaa8f162b63ed95fa4e7f48e1ce32a2b531cefd9a1c46f7

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b7089155fd76f9a8ae7e157517ac32d86342787552baea1d2dec20fbcfa2e6fa

kernel-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 0c3fdbb45452017b4e704c868243fbe3c9a7d13f276a5483d37fdeaac2826e4f

kernel-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d228d5d24868621e6cadbb643c354aa34c939b6da8fba55680d84b93a425b2d

kernel-tools-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 55cbf524d389498cf8a97935d861042730e4678514b15ec26efe34128fd110be

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 28816481f44def4b9daa1a12ff3cbb8cc5885a4a2f362ea391279cc5b7b823a2

kernel-tools-libs-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: aa607c0b5814d6fcd6c8a1446f8eee5db9b2012847675848389958bea1c65c0c

perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 79d0b8328addf316c33bbf97b5c5e0bdf09cfbbef44b972033c75d38bedbc66a

perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: cb7f07a761101f18caea7e0efd483c67a87c09efe16df3a0dfc52c6cd994c302

python3-perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a46c1b4e62ad003741d47c9b40cba4bae293e37426c0e94474a8855171cd0df

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: a722c4f9cb3c926141243c7c47548406d850d315ec957fa1a7df97f39a3b7974

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

x86_64

bpftool-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b2b3562c70d51d0daec4e21e6b069cb2ee86bcdcf28bab05ad510c182ff0903f

bpftool-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: e602471560c8c7150923d47753574aaf03c2edfbcddb0c392aa6e549fa00c462

kernel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 39dfaff5588f5076eede53d9dc2b1b3e11b9db78b8b50c345ff3742b9e6e14ad

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 641e4ac4c935bf8dff76327ef2c3daf81098361f3b28d4cf2d6caa9339cbaebb

kernel-cross-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d472e2e103ba08d641fb7332a3ea51f36934710ca9ad2fe2e9b3fffdf0df738

kernel-debug-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 167ba2533b8feb62e1a91d838b09ac059e513ba3594b040775e9b75ee71bd2fe

kernel-debug-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 9c496626a9822e9c3ec1628b2d37c1c16a66666b0227fabd002102446aa42377

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 96a17a13332c365c70e58db6fa25b38d5990ec38ba1f8b09af6d3b653f852008

kernel-debug-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 95c0c19f4690c6817df6e755e0ce25f345afe5963345c80f9dee900501c08947

kernel-debug-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a618186732872c028759658616eabed69502c0c68e2c22c7e132475391baf8c

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 7371b1a69136971994403e75ac1ff73302be665a307cb0b9b5489d1b476a907f

kernel-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: ffe8e63719b3647dc8a7ac95f89506160c94e27d06878231f5b0aca144fbc569

kernel-debuginfo-common-x86_64-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1de76cdea022086c86a1a6dcfd904cb5d7764262d19d9b29a38adb10ba901599

kernel-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 8a4ffd6018b0db5cacaa8f162b63ed95fa4e7f48e1ce32a2b531cefd9a1c46f7

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b7089155fd76f9a8ae7e157517ac32d86342787552baea1d2dec20fbcfa2e6fa

kernel-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 0c3fdbb45452017b4e704c868243fbe3c9a7d13f276a5483d37fdeaac2826e4f

kernel-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d228d5d24868621e6cadbb643c354aa34c939b6da8fba55680d84b93a425b2d

kernel-tools-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 55cbf524d389498cf8a97935d861042730e4678514b15ec26efe34128fd110be

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 28816481f44def4b9daa1a12ff3cbb8cc5885a4a2f362ea391279cc5b7b823a2

kernel-tools-libs-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: aa607c0b5814d6fcd6c8a1446f8eee5db9b2012847675848389958bea1c65c0c

perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 79d0b8328addf316c33bbf97b5c5e0bdf09cfbbef44b972033c75d38bedbc66a

perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: cb7f07a761101f18caea7e0efd483c67a87c09efe16df3a0dfc52c6cd994c302

python3-perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a46c1b4e62ad003741d47c9b40cba4bae293e37426c0e94474a8855171cd0df

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: a722c4f9cb3c926141243c7c47548406d850d315ec957fa1a7df97f39a3b7974

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

s390x

bpftool-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 60a2a3dd0d0823dff3f1691880367cc4961112a3fee1dcbf738c5dfb610ad3ff

bpftool-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: e4753c7d911257022e27e608a010166af39fea61a63667feb022f84fed6521b7

kernel-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 6c79b7e459ce21acd90606ec6b731cf3f1c05b0112ae32e792ba79c16e2d28d1

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 0f6a82885248e5ce602b13ce409f5ce1e618a872c8cd92d3413152c8adb17e85

kernel-cross-headers-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 726e85b0f9517911d912fc1370882c2072cbf789eef2fd07f9566819fcbd11a0

kernel-debug-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: a04b42e18980d4e3ee0dca6ac97463d5a2a940b5497d1da719404e46d774820b

kernel-debug-core-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: f7729db50c0b3f10e3dc50f87268a40078214e8cc98d256e6c537bdb2f1485d7

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 93d8771b39943c27f029d95822a8dfcb9bf4079902b44bc62624c417f92e80e4

kernel-debug-devel-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 03540f0762eec56e865d06e761d1accce438602c91b34b6bea9de49b8fc6501d

kernel-debug-modules-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: be29591b922304b9d7d9d7e8dced5d6f45f29ef78c303b054180cd55b047fa11

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 013261ff82c972b8de7f88623ee18d77b12c74f47d9c61bd6d923bdea7a31994

kernel-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 5b3e5ace77392fb317b90cd83f0bd132e081d2d528814023cd43cc3769525469

kernel-debuginfo-common-s390x-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: aae4ec79c3312dc84beb8b70f18b9c0040fe402608ae9b5986e835439642aa45

kernel-devel-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 70f610998c428b8d1f8c54aedc3630a28d644ca795400f24d90a2e4571d6e5f2

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: b135ad15e60a8d4d16c0ea61c6993566c55ba1fb594f0070bd1e8e3ec8bb76c6

kernel-modules-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: a77e396a71bd19f772ca9c56e8b1a8e81189c068e87c26ddd20a0c3d6f041114

kernel-modules-extra-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: b38d8b21f6acb4508622ad5b407e1bcb805589563d10fdf6276ff65369404033

kernel-tools-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 2db49245a38bb92c4854bc03a5aa8e6064d8e6998c9de7aef73ed9b8eae6e0b8

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: b552e568289bc9e649a58a497a7976c73b1234d5e155cc2de2cee906091bf9f4

kernel-zfcpdump-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: bc45067a53e1c3f6c979773746ca4e68a5f7cfe3384689676495abef603b64db

kernel-zfcpdump-core-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 04da7d0ebfcfec8f6fe59f7903772b32dbd1cb3bff982a709aa9fc17d38a034b

kernel-zfcpdump-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 82320d1339396afd4937ec59acc07e5c15edde90b44047a0a5adfb86b4579b10

kernel-zfcpdump-devel-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 52c343fdd1f89b7c77386faa9ea5b4d9befbf73945cd994933f395c103ef11ab

kernel-zfcpdump-modules-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: efab10253c41a573b2289504717a4bc583122b1f2287310499984f2f351c2280

kernel-zfcpdump-modules-extra-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 139b4b6d7658ba3e8764f3f872f87fe789f3ca31695290db42f35e501748e265

perf-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 9af77a36fb1955d2322ba8490497dc5f7cb1faeeda140d98f231760eb771d8a2

perf-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 31c832dabe106ca20e6eaf30d2d4053023661e1b63733d5a2b7a0d4df85ac38f

python3-perf-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: e0707c25a44285b4e36faff339aad7561b3a1d7854d79b50eff3d1ddb407c0a8

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.s390x.rpm

SHA-256: 1336f24a19d6bb1ff9735f1a321a2cf32efeb65175a9ffdaae54e994b1df9a4a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

ppc64le

bpftool-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: feaa513d139d4f29577f9c3c28cc7214444985212b673347e1459d518d6b706c

bpftool-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: b7560408f05f34d6bfe3c3f8ee1586421d308c5012c4770470896b27b9c8296f

kernel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 26cf215af25d8f5b14d086d7a265a78824ef8b42260ab0c587c57bfeeeb438ce

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 600b1b540e14f559d492ffcf350b31ab63cf78774db69b91ede542d9b50a047a

kernel-cross-headers-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 6f62195400fd2ca74ad0934113e1fc4605dd6b7ecb9a3e25804e4ceb37d5321b

kernel-debug-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: a02d71d2f66749b9a1f7eb9c8bbab9cbe99b1c3723bb87260e9342658c1a97f8

kernel-debug-core-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: dddfc5b6f67635ac561a0e282f6d10374825892b2d5a6ddd988c76bf449ffc26

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 97640eda4ce85b0a09fcc082fa0add9fef89c6171ccfa25e0788e512f862eb06

kernel-debug-devel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: df686c28c0c93186571be0345cd3131d49a607b19cc41d7acecf9d5fce814a60

kernel-debug-modules-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 89c0ba856515bbb24fbf9c729507243be9f9389636a77d1fab6d339c7152bf1f

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: df392059c0d51497afb9900d422c9fbc100fbcc4fac8b7a67cc76ac33ce25d59

kernel-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0298ae04fad8effb8772cdb7c847ca294f08de042e2bb907563a24370cc4a69a

kernel-debuginfo-common-ppc64le-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0d6b16e69a2fb0fe974f871b04ebc5a63a30b4549f22f31e2ec91e1d837d43bd

kernel-devel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 5c3f41ec4e666567bc00446540f30dc13ca831688914ae59191eb16b0ccfddb4

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 4fba4adcbd729f966112c641d3f7e3b0db9d5a321d3101b8239e41205791e1df

kernel-modules-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: b33bd1465f078c0f8946cddd7dd67102a9c1a4c997770f23e36008363c84365d

kernel-modules-extra-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: d79c24e83e152015a04fc491ca05b0fbb7c9333f3c1e5d11aeb30e4960ab0809

kernel-tools-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: e84edb4a85b1f88b7953f1adbbf8dd34d8172aa46d45e1181f8f3d84fe94a009

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 7fda6f7003d3e70e71e5dbaf28bb4348afec7136d62b85edfd38e5d6ca9d5524

kernel-tools-libs-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: fe3b166553ed0d112fbd8613528e668515e1e617d8c2f71139e09295204e8516

perf-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 2eeebedde160c5ed3364f250756a79b8566acf476d49a68f0fc35848e839d316

perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0ce6f6d40337b4bbe6fdd94d884fbb47547d2e0363d69496d6f86ae0ce97e54e

python3-perf-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: fac531172bd9fd281a6e7ca9d954f453ebc82e6e7ee856a8411476ccc7cbf8be

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 942ced0de6d5e81859cb62de48d475390d820414b8f0a29a29713ff21b617e73

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

x86_64

bpftool-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b2b3562c70d51d0daec4e21e6b069cb2ee86bcdcf28bab05ad510c182ff0903f

bpftool-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: e602471560c8c7150923d47753574aaf03c2edfbcddb0c392aa6e549fa00c462

kernel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 39dfaff5588f5076eede53d9dc2b1b3e11b9db78b8b50c345ff3742b9e6e14ad

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 641e4ac4c935bf8dff76327ef2c3daf81098361f3b28d4cf2d6caa9339cbaebb

kernel-cross-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d472e2e103ba08d641fb7332a3ea51f36934710ca9ad2fe2e9b3fffdf0df738

kernel-debug-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 167ba2533b8feb62e1a91d838b09ac059e513ba3594b040775e9b75ee71bd2fe

kernel-debug-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 9c496626a9822e9c3ec1628b2d37c1c16a66666b0227fabd002102446aa42377

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 96a17a13332c365c70e58db6fa25b38d5990ec38ba1f8b09af6d3b653f852008

kernel-debug-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 95c0c19f4690c6817df6e755e0ce25f345afe5963345c80f9dee900501c08947

kernel-debug-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a618186732872c028759658616eabed69502c0c68e2c22c7e132475391baf8c

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 7371b1a69136971994403e75ac1ff73302be665a307cb0b9b5489d1b476a907f

kernel-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: ffe8e63719b3647dc8a7ac95f89506160c94e27d06878231f5b0aca144fbc569

kernel-debuginfo-common-x86_64-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1de76cdea022086c86a1a6dcfd904cb5d7764262d19d9b29a38adb10ba901599

kernel-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 8a4ffd6018b0db5cacaa8f162b63ed95fa4e7f48e1ce32a2b531cefd9a1c46f7

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b7089155fd76f9a8ae7e157517ac32d86342787552baea1d2dec20fbcfa2e6fa

kernel-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 0c3fdbb45452017b4e704c868243fbe3c9a7d13f276a5483d37fdeaac2826e4f

kernel-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d228d5d24868621e6cadbb643c354aa34c939b6da8fba55680d84b93a425b2d

kernel-tools-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 55cbf524d389498cf8a97935d861042730e4678514b15ec26efe34128fd110be

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 28816481f44def4b9daa1a12ff3cbb8cc5885a4a2f362ea391279cc5b7b823a2

kernel-tools-libs-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: aa607c0b5814d6fcd6c8a1446f8eee5db9b2012847675848389958bea1c65c0c

perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 79d0b8328addf316c33bbf97b5c5e0bdf09cfbbef44b972033c75d38bedbc66a

perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: cb7f07a761101f18caea7e0efd483c67a87c09efe16df3a0dfc52c6cd994c302

python3-perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a46c1b4e62ad003741d47c9b40cba4bae293e37426c0e94474a8855171cd0df

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: a722c4f9cb3c926141243c7c47548406d850d315ec957fa1a7df97f39a3b7974

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

aarch64

bpftool-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: e8a130debc1d4f0b580b5183e2ed8d75313f4dcb31caadf7c8693f238e17a179

bpftool-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 46f4e8ab8781b559eda3a73c3db4da0ee427325f0e76240ab50afe3ef7321e4e

kernel-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 0a364ed024edc8102e3c87109d1155a75b3b8ae45ed4402d90f028f058a76595

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 4023abe038387dacf46ca8b369f4fbf9476f509aee6819155c6b79610bbf163d

kernel-cross-headers-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: bf9e63920e384ab4fd39c68428ad95789bf205894f50783f63ddbbbf1f6ea782

kernel-debug-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: a066b76937fdb57c6b95f3469bc6bcd3fc8a889a8be285ad0a84fb0806a7ea4a

kernel-debug-core-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 748b4a229888cb59d04f321fcdbffb61620cbd1be6d1d84ceb85595814b559f3

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 8c48d2ef904dfe3ca55d6ab68705d8d103fe629e9c4c3d45f857b2df0a1d6062

kernel-debug-devel-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 4729434772bcc254824cf588ab82e9d9aad8c49ab4a1e13ae90c37bd37c59a92

kernel-debug-modules-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: c2e92513df9ee9e462efee08e54506677e9cb820e2a6c4b0636002dde18f5063

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 7e7a0ae0836775a97f0c2a6a381f0787fa6989bf2a4e9020ffaeac7dcbcbb7a8

kernel-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 24fc9f3c9e561717938825f77fe6b82829fa3fb102409c6aa5dc1dccb6fd08a3

kernel-debuginfo-common-aarch64-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: f168e559899fe7f44df3cf3d6ac377ed6dd4f82730823709633e1e829b20ef8b

kernel-devel-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 1ba1167f074c32b20d6baad0f99322a9f66b94e3f61d8ee901faa305a22a8f0d

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: b29c7ec815f17d28424ba5f413c0725dcc6e4563f240c3bdf620baa20cb41b62

kernel-modules-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: db7b4fa00250e6c2cd7c311957115d3d9f7f1ee7369a1820abe683e3a3a4ff46

kernel-modules-extra-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 785e6e9be766347796e93b3a3d9ba975c76cb479977c655a98fd9195ebcc0b76

kernel-tools-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: b8746dcfc76ab31aea32c6b33feca8d373acfaec623ce6f41d68204692e413fe

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 83619e6c14079fb520ff327b805c5d05951a1b73c4cae99658ae27172561ba4e

kernel-tools-libs-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: fe9f9bc465b69a4db0435bbd39f243115816a593671b6b876957ba877b1eba9e

perf-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 3668c1fa9719df3a138d1731f5ee51a058edab097e7623a4b56adbf3e0ee3a3e

perf-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 6bbaead9bc748f87806565091478910a292e18f5bebf28484a0eeac64701a1b3

python3-perf-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 0b193be895d39d1ba184f4a711f3ded6d6973ac0bceb7f198c3a1ab3898ebdde

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: c1bbdda08fe99774a80b9a2069938152c90cc9833daaa63ccb89fc86b81d38d7

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

ppc64le

bpftool-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: feaa513d139d4f29577f9c3c28cc7214444985212b673347e1459d518d6b706c

bpftool-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: b7560408f05f34d6bfe3c3f8ee1586421d308c5012c4770470896b27b9c8296f

kernel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 26cf215af25d8f5b14d086d7a265a78824ef8b42260ab0c587c57bfeeeb438ce

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 600b1b540e14f559d492ffcf350b31ab63cf78774db69b91ede542d9b50a047a

kernel-cross-headers-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 6f62195400fd2ca74ad0934113e1fc4605dd6b7ecb9a3e25804e4ceb37d5321b

kernel-debug-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: a02d71d2f66749b9a1f7eb9c8bbab9cbe99b1c3723bb87260e9342658c1a97f8

kernel-debug-core-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: dddfc5b6f67635ac561a0e282f6d10374825892b2d5a6ddd988c76bf449ffc26

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 97640eda4ce85b0a09fcc082fa0add9fef89c6171ccfa25e0788e512f862eb06

kernel-debug-devel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: df686c28c0c93186571be0345cd3131d49a607b19cc41d7acecf9d5fce814a60

kernel-debug-modules-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 89c0ba856515bbb24fbf9c729507243be9f9389636a77d1fab6d339c7152bf1f

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: df392059c0d51497afb9900d422c9fbc100fbcc4fac8b7a67cc76ac33ce25d59

kernel-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0298ae04fad8effb8772cdb7c847ca294f08de042e2bb907563a24370cc4a69a

kernel-debuginfo-common-ppc64le-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0d6b16e69a2fb0fe974f871b04ebc5a63a30b4549f22f31e2ec91e1d837d43bd

kernel-devel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 5c3f41ec4e666567bc00446540f30dc13ca831688914ae59191eb16b0ccfddb4

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 4fba4adcbd729f966112c641d3f7e3b0db9d5a321d3101b8239e41205791e1df

kernel-modules-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: b33bd1465f078c0f8946cddd7dd67102a9c1a4c997770f23e36008363c84365d

kernel-modules-extra-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: d79c24e83e152015a04fc491ca05b0fbb7c9333f3c1e5d11aeb30e4960ab0809

kernel-tools-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: e84edb4a85b1f88b7953f1adbbf8dd34d8172aa46d45e1181f8f3d84fe94a009

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 7fda6f7003d3e70e71e5dbaf28bb4348afec7136d62b85edfd38e5d6ca9d5524

kernel-tools-libs-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: fe3b166553ed0d112fbd8613528e668515e1e617d8c2f71139e09295204e8516

perf-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 2eeebedde160c5ed3364f250756a79b8566acf476d49a68f0fc35848e839d316

perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0ce6f6d40337b4bbe6fdd94d884fbb47547d2e0363d69496d6f86ae0ce97e54e

python3-perf-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: fac531172bd9fd281a6e7ca9d954f453ebc82e6e7ee856a8411476ccc7cbf8be

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 942ced0de6d5e81859cb62de48d475390d820414b8f0a29a29713ff21b617e73

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.76.1.el8_4.src.rpm

SHA-256: 2fdbf1a4a8f41c7e919cf1298a51092fadb9d7eae8163c82a3dcefbfd888cf6c

x86_64

bpftool-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b2b3562c70d51d0daec4e21e6b069cb2ee86bcdcf28bab05ad510c182ff0903f

bpftool-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: e602471560c8c7150923d47753574aaf03c2edfbcddb0c392aa6e549fa00c462

kernel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 39dfaff5588f5076eede53d9dc2b1b3e11b9db78b8b50c345ff3742b9e6e14ad

kernel-abi-stablelists-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 851fb918ebbc7b57ceac698a0cc95cfafa4480af56cfee9a2898970beb0d2ae0

kernel-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 641e4ac4c935bf8dff76327ef2c3daf81098361f3b28d4cf2d6caa9339cbaebb

kernel-cross-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d472e2e103ba08d641fb7332a3ea51f36934710ca9ad2fe2e9b3fffdf0df738

kernel-debug-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 167ba2533b8feb62e1a91d838b09ac059e513ba3594b040775e9b75ee71bd2fe

kernel-debug-core-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 9c496626a9822e9c3ec1628b2d37c1c16a66666b0227fabd002102446aa42377

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 96a17a13332c365c70e58db6fa25b38d5990ec38ba1f8b09af6d3b653f852008

kernel-debug-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 95c0c19f4690c6817df6e755e0ce25f345afe5963345c80f9dee900501c08947

kernel-debug-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a618186732872c028759658616eabed69502c0c68e2c22c7e132475391baf8c

kernel-debug-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 7371b1a69136971994403e75ac1ff73302be665a307cb0b9b5489d1b476a907f

kernel-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: ffe8e63719b3647dc8a7ac95f89506160c94e27d06878231f5b0aca144fbc569

kernel-debuginfo-common-x86_64-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1de76cdea022086c86a1a6dcfd904cb5d7764262d19d9b29a38adb10ba901599

kernel-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 8a4ffd6018b0db5cacaa8f162b63ed95fa4e7f48e1ce32a2b531cefd9a1c46f7

kernel-doc-4.18.0-305.76.1.el8_4.noarch.rpm

SHA-256: 30872c28899fa44d556c3198ad387f45ae9b69e11e0125190b0a26edcd7602b5

kernel-headers-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: b7089155fd76f9a8ae7e157517ac32d86342787552baea1d2dec20fbcfa2e6fa

kernel-modules-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 0c3fdbb45452017b4e704c868243fbe3c9a7d13f276a5483d37fdeaac2826e4f

kernel-modules-extra-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 4d228d5d24868621e6cadbb643c354aa34c939b6da8fba55680d84b93a425b2d

kernel-tools-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 55cbf524d389498cf8a97935d861042730e4678514b15ec26efe34128fd110be

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 28816481f44def4b9daa1a12ff3cbb8cc5885a4a2f362ea391279cc5b7b823a2

kernel-tools-libs-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: aa607c0b5814d6fcd6c8a1446f8eee5db9b2012847675848389958bea1c65c0c

perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 79d0b8328addf316c33bbf97b5c5e0bdf09cfbbef44b972033c75d38bedbc66a

perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: cb7f07a761101f18caea7e0efd483c67a87c09efe16df3a0dfc52c6cd994c302

python3-perf-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1a46c1b4e62ad003741d47c9b40cba4bae293e37426c0e94474a8855171cd0df

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: a722c4f9cb3c926141243c7c47548406d850d315ec957fa1a7df97f39a3b7974

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: e602471560c8c7150923d47753574aaf03c2edfbcddb0c392aa6e549fa00c462

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 96a17a13332c365c70e58db6fa25b38d5990ec38ba1f8b09af6d3b653f852008

kernel-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: ffe8e63719b3647dc8a7ac95f89506160c94e27d06878231f5b0aca144fbc569

kernel-debuginfo-common-x86_64-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 1de76cdea022086c86a1a6dcfd904cb5d7764262d19d9b29a38adb10ba901599

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 28816481f44def4b9daa1a12ff3cbb8cc5885a4a2f362ea391279cc5b7b823a2

kernel-tools-libs-devel-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: 2ea1eb152a1ad65da48bc4e18bb242cbea04db92157ef71a75f0c73d30e2ee5b

perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: cb7f07a761101f18caea7e0efd483c67a87c09efe16df3a0dfc52c6cd994c302

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.x86_64.rpm

SHA-256: a722c4f9cb3c926141243c7c47548406d850d315ec957fa1a7df97f39a3b7974

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: b7560408f05f34d6bfe3c3f8ee1586421d308c5012c4770470896b27b9c8296f

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 97640eda4ce85b0a09fcc082fa0add9fef89c6171ccfa25e0788e512f862eb06

kernel-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0298ae04fad8effb8772cdb7c847ca294f08de042e2bb907563a24370cc4a69a

kernel-debuginfo-common-ppc64le-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0d6b16e69a2fb0fe974f871b04ebc5a63a30b4549f22f31e2ec91e1d837d43bd

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 7fda6f7003d3e70e71e5dbaf28bb4348afec7136d62b85edfd38e5d6ca9d5524

kernel-tools-libs-devel-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: fb97da604de1025a36188026c0425c8d718f049694ca67ff2d9d440ed1a0eb2c

perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 0ce6f6d40337b4bbe6fdd94d884fbb47547d2e0363d69496d6f86ae0ce97e54e

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.ppc64le.rpm

SHA-256: 942ced0de6d5e81859cb62de48d475390d820414b8f0a29a29713ff21b617e73

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 46f4e8ab8781b559eda3a73c3db4da0ee427325f0e76240ab50afe3ef7321e4e

kernel-debug-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 8c48d2ef904dfe3ca55d6ab68705d8d103fe629e9c4c3d45f857b2df0a1d6062

kernel-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 24fc9f3c9e561717938825f77fe6b82829fa3fb102409c6aa5dc1dccb6fd08a3

kernel-debuginfo-common-aarch64-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: f168e559899fe7f44df3cf3d6ac377ed6dd4f82730823709633e1e829b20ef8b

kernel-tools-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 83619e6c14079fb520ff327b805c5d05951a1b73c4cae99658ae27172561ba4e

kernel-tools-libs-devel-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: fc9cbf929a3ec86d3b3d19c9e79d159a1d6ceb1f0eb1701a478161487d8ef6f5

perf-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: 6bbaead9bc748f87806565091478910a292e18f5bebf28484a0eeac64701a1b3

python3-perf-debuginfo-4.18.0-305.76.1.el8_4.aarch64.rpm

SHA-256: c1bbdda08fe99774a80b9a2069938152c90cc9833daaa63ccb89fc86b81d38d7

Related news

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

Red Hat Security Advisory 2023-1192-01

Red Hat Security Advisory 2023-1192-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

Ubuntu Security Notice USN-5929-1

Ubuntu Security Notice 5929-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2023:1130: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking co...

Ubuntu Security Notice USN-5912-1

Ubuntu Security Notice 5912-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0856-01

Red Hat Security Advisory 2023-0856-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

Red Hat Security Advisory 2023-0794-01

Red Hat Security Advisory 2023-0794-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:0794: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates

Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload i...

Ubuntu Security Notice USN-5859-1

Ubuntu Security Notice 5859-1 - Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Netronome Ethernet driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2023-0499-01

Red Hat Security Advisory 2023-0499-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:0531: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0531: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0499: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2022-4139: Invalid Bug ID

An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.

Red Hat Security Advisory 2023-0440-01

Red Hat Security Advisory 2023-0440-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

Red Hat Security Advisory 2023-0399-01

Red Hat Security Advisory 2023-0399-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

Red Hat Security Advisory 2023-0400-01

Red Hat Security Advisory 2023-0400-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Red Hat Security Advisory 2023-0396-01

Red Hat Security Advisory 2023-0396-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

Red Hat Security Advisory 2023-0395-01

Red Hat Security Advisory 2023-0395-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

Red Hat Security Advisory 2023-0392-01

Red Hat Security Advisory 2023-0392-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

RHSA-2023:0440: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-26373: hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions

RHSA-2023:0400: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-26401: hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.

RHSA-2023:0392: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.

RHSA-2023:0300: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-3059...

RHSA-2023:0334: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2959: kernel: watch queue race condition can lead to privilege escalation * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-3077: kernel: i2c: unbounded length leads to buffer overflow in ismt_access() * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access * CVE-2022-30594: ...

Red Hat Security Advisory 2023-0123-01

Red Hat Security Advisory 2023-0123-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0101: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

RHSA-2023:0114: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device. * CVE-2022-4139: kernel: i915: Incorrect GPU TLB flush can lead to random memory access

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

CVE-2022-41686: en/security-disclosure/2022/2022-10.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption.