Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5249: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
  • CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
  • CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Data
#vulnerability#linux#red_hat#buffer_overflow#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)
  • kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)
  • SR-IOV performance > 50% degradation (BZ#2074830)
  • fix data corruption caused by dm-integrity (BZ#2082187)
  • SCTP client-side peeloff issues [rhel-9] (BZ#2084044)
  • TCP connection fails in a asymmetric routing situation (BZ#2085480)
  • Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)
  • spec: Fix separate tools build (BZ#2090852)
  • call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255)
  • Mark ThunderX NIC driver as unmaintained (BZ#2092638)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code
  • BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  • BZ - 2092427 - CVE-2022-1966 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVEs

  • CVE-2022-1012
  • CVE-2022-1729
  • CVE-2022-1966
  • CVE-2022-27666

Red Hat Enterprise Linux for x86_64 9

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

x86_64

bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3163dbd2be6e35cefd6bb40759c29794612fb87a30fe731755f6a7bb35026840

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

kernel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 23651e85fc03383b9d2075ab60e814f06154a7e4b4f5d397b51a936ef1f32e15

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 530d16d3def3abc8ed570efd5444afe6e9a3ee39a70b3133f9c47370d4765e09

kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bee7c680b5eaeb93389001fbf43abe47abdb9ec6b7fb4267554891dbd423ab65

kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: a6acd53bbb32df6915a6164e3261073c589eea88ff1044a72c514b9602ce3d0e

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: fc52f75dddea225c6258d50033fec03a035722f7dce92d2fe5b4e8f8fa623a17

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: e11d04b8e142180d3af56dae185ba31371d8c8fde12ce2b5cc05d8f9d6759364

kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5b012dfde70d85b8d5587e254dc50b992474c2f9ec5842448cc01181e1807490

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 92ba834740e22f59bd7c3b0161631a1cd70b2c4475aa2575f2b6b8ae1daaf649

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 2600e75af8051e16fac5fc490cd543b8510315bd9c08ca4085ac8fffd2f82b5c

kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 72a86a9dac9b73d3532eeefe31b0ec88458aa28573a8439753741acc2437e66b

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 1674feb9231961f93503241b2249e766bccd9c8637587b5d4009292f203acea7

kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 57597cde32c287b492254c17e85d4360ae314fe1327eac1f11bf550f643ef578

kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 494375eb021b8656daec443ebefe7113f790ea7aab77e100540f4531b0b25526

kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bae0b89a76bb2a3512e9c5f40a224c2d3c1851147d7916c4c3c3cfab17d080ca

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 93183aa8d6aa662c782c3a3ebea060ef84bede17df0462f635dba94ce6cb00bf

perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c840823e73022b6705164e782e26f426f953e5bc7d497e74a90fce00dc45997

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 4c3ad303e990675c692e76ce1982a22712e622d0213a039cd09c48afcfe36b89

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

x86_64

bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3163dbd2be6e35cefd6bb40759c29794612fb87a30fe731755f6a7bb35026840

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

kernel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 23651e85fc03383b9d2075ab60e814f06154a7e4b4f5d397b51a936ef1f32e15

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 530d16d3def3abc8ed570efd5444afe6e9a3ee39a70b3133f9c47370d4765e09

kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bee7c680b5eaeb93389001fbf43abe47abdb9ec6b7fb4267554891dbd423ab65

kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: a6acd53bbb32df6915a6164e3261073c589eea88ff1044a72c514b9602ce3d0e

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: fc52f75dddea225c6258d50033fec03a035722f7dce92d2fe5b4e8f8fa623a17

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: e11d04b8e142180d3af56dae185ba31371d8c8fde12ce2b5cc05d8f9d6759364

kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5b012dfde70d85b8d5587e254dc50b992474c2f9ec5842448cc01181e1807490

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 92ba834740e22f59bd7c3b0161631a1cd70b2c4475aa2575f2b6b8ae1daaf649

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 2600e75af8051e16fac5fc490cd543b8510315bd9c08ca4085ac8fffd2f82b5c

kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 72a86a9dac9b73d3532eeefe31b0ec88458aa28573a8439753741acc2437e66b

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 1674feb9231961f93503241b2249e766bccd9c8637587b5d4009292f203acea7

kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 57597cde32c287b492254c17e85d4360ae314fe1327eac1f11bf550f643ef578

kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 494375eb021b8656daec443ebefe7113f790ea7aab77e100540f4531b0b25526

kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bae0b89a76bb2a3512e9c5f40a224c2d3c1851147d7916c4c3c3cfab17d080ca

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 93183aa8d6aa662c782c3a3ebea060ef84bede17df0462f635dba94ce6cb00bf

perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c840823e73022b6705164e782e26f426f953e5bc7d497e74a90fce00dc45997

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 4c3ad303e990675c692e76ce1982a22712e622d0213a039cd09c48afcfe36b89

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

s390x

bpftool-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 4cabcdf646997515771d7044e1e2dd5a0f6d9256603ad30b2f8877fbb6be8d8a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

kernel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 80caa6440596f6ffd4bcb6782c6314e3fa3ecfb4809edaf41e8bb67b3a13584a

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 22783c0a7e6a5834040ccee971e04701231354f7969b2178b89b9ac502bfd531

kernel-debug-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3f20be4453bf4a1afe5b13e1e973bc9570bb11224b98b26c99fb9ec6464210a7

kernel-debug-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 8579f8cb0ffb3089e23e1fa0ddb7e65707baed14f83914d13a05eb045a12a4d9

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3c9066f2ce2da8d76a89c3b27bfb9a452170a6725a54a10f98bd0c0d7e7419e1

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 0d13e9cccaa188fd996fb297521c07ef4e2bf60aa1a1cce7805fc0a9468e7fa7

kernel-debug-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bb5594cd6403260d6c90a542006dba93b49801a9468024d1967b8db23ce002c6

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1da82420fe846c78eeba14adfc5b0f565e158e3bcacb874ed6a92743a2bb19ad

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 605bc42bda79b1e103ab0b509ca1cdc617d73cbb1493e0593dcba0491903b806

kernel-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 469ace93bcda0418b8c85d9294292d1638273352d41a60fbc96e83c010f55a8f

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: ebd6a8d7c18f9307de52285a973b560c183a30a3edd143f0321add37ef52c7fa

kernel-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bce87ce7236440e38f229f7030422917cb44f8dad438d2c0d5b27f9b561dba1e

kernel-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f3be2c7bd6e2966e7dd5a375cd8f93660d9f29b335ac9a4bb1ac51825cb3c0

kernel-tools-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1439ce770f16c08ce8cf4e4177f9826a3e0cb4f09b968b3e65c13727288dce0b

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-zfcpdump-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: b5fbe39caf848a201a7e7c4373c53d0996002436525c8a503721ef4f28f2b4aa

kernel-zfcpdump-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: f787934d60a53816b61eabcf245d1030dae1919ee31b3a9b1be9e063f081d015

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 94b9ec69fdce47c9af768391602387e3f358f1ad2cd6e108e3fea8526c00b963

kernel-zfcpdump-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcea620847a7a63e2c1150cee8543bcd1c24629cc59587eb3b11586de47104b1

kernel-zfcpdump-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: df8ab6b2b36924109784c19c7f2a1695f0cb3ba5040a448d0c562973555a87c3

kernel-zfcpdump-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c84cccada852ac312c96ca33d5015e3203a4f2dd9545894ff67f156148e0e993

perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d30f4061b7c45101b11ee19ed2b8550da0e56047eda454a063b4d2b8ff3b7515

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

python3-perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c62bb97d03c2a5faeef6bc6924cb1b1d14b9bb847e99c27ddbec5301ab66af50

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

s390x

bpftool-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 4cabcdf646997515771d7044e1e2dd5a0f6d9256603ad30b2f8877fbb6be8d8a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

kernel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 80caa6440596f6ffd4bcb6782c6314e3fa3ecfb4809edaf41e8bb67b3a13584a

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 22783c0a7e6a5834040ccee971e04701231354f7969b2178b89b9ac502bfd531

kernel-debug-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3f20be4453bf4a1afe5b13e1e973bc9570bb11224b98b26c99fb9ec6464210a7

kernel-debug-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 8579f8cb0ffb3089e23e1fa0ddb7e65707baed14f83914d13a05eb045a12a4d9

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3c9066f2ce2da8d76a89c3b27bfb9a452170a6725a54a10f98bd0c0d7e7419e1

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 0d13e9cccaa188fd996fb297521c07ef4e2bf60aa1a1cce7805fc0a9468e7fa7

kernel-debug-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bb5594cd6403260d6c90a542006dba93b49801a9468024d1967b8db23ce002c6

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1da82420fe846c78eeba14adfc5b0f565e158e3bcacb874ed6a92743a2bb19ad

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 605bc42bda79b1e103ab0b509ca1cdc617d73cbb1493e0593dcba0491903b806

kernel-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 469ace93bcda0418b8c85d9294292d1638273352d41a60fbc96e83c010f55a8f

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: ebd6a8d7c18f9307de52285a973b560c183a30a3edd143f0321add37ef52c7fa

kernel-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bce87ce7236440e38f229f7030422917cb44f8dad438d2c0d5b27f9b561dba1e

kernel-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f3be2c7bd6e2966e7dd5a375cd8f93660d9f29b335ac9a4bb1ac51825cb3c0

kernel-tools-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1439ce770f16c08ce8cf4e4177f9826a3e0cb4f09b968b3e65c13727288dce0b

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-zfcpdump-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: b5fbe39caf848a201a7e7c4373c53d0996002436525c8a503721ef4f28f2b4aa

kernel-zfcpdump-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: f787934d60a53816b61eabcf245d1030dae1919ee31b3a9b1be9e063f081d015

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 94b9ec69fdce47c9af768391602387e3f358f1ad2cd6e108e3fea8526c00b963

kernel-zfcpdump-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcea620847a7a63e2c1150cee8543bcd1c24629cc59587eb3b11586de47104b1

kernel-zfcpdump-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: df8ab6b2b36924109784c19c7f2a1695f0cb3ba5040a448d0c562973555a87c3

kernel-zfcpdump-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c84cccada852ac312c96ca33d5015e3203a4f2dd9545894ff67f156148e0e993

perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d30f4061b7c45101b11ee19ed2b8550da0e56047eda454a063b4d2b8ff3b7515

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

python3-perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c62bb97d03c2a5faeef6bc6924cb1b1d14b9bb847e99c27ddbec5301ab66af50

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

Red Hat Enterprise Linux for Power, little endian 9

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

ppc64le

bpftool-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: c2775af340e804b780a720d888978cc877c64648b4b97f49f2b63944255a2f82

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

kernel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 9dafa91a66ca58c8380106c1f54e016ba01e7ea96f911b88642ce39006ad0d41

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 752c5005da927f4652759823efaf961abc9d01dd0668308ec7de6e88f3e0ec2d

kernel-debug-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: bee6ac1e39be97a0da4d7805d858faa7c95f425b6937ba67f66fe7381f294f15

kernel-debug-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b51a1e1ff740efe8201d5ab0bb0a4f82be7f883522333244d8c22dbee25621a8

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3da506c7205e627ece6c392a75b0fc6f98de53c792b5f8f860dd5e9dfbd2fb3f

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: d8f35d8cd014fe979a89a9c6767d207ccd1d322f560325fe5ec982932f773d6e

kernel-debug-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 58962144a843867c347e0bfdd8a14eeae9c2e6aee0c6d5ab9f0b344bd6bb067c

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 82fa5a5a1528a46d26c74a4b4f4978dcc7afdb2614e40d581536d9cece7f1afa

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: f34ccadd3160951c75fa05aa99bb908bf79bfbe08efaaa22181b32c8b4e71401

kernel-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 309f48f88810b901034f8c1b44c283f4af157d67d7534b9d153f96c09a4fd973

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fcfffabe45001b9e451cb7bf4daae6169db534027c3a1eb45d217bf8039f7b75

kernel-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 515a2257e14d4c47e70648dfea826f81e8529f7a3a00e3e831f688587e2bdddc

kernel-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 74f5dcfc978ffa6e1b31b3fa6a410f5847eb4208911fe6e37066998a142c7b65

kernel-tools-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 76cf66e9cea848af3b0547f8153ce9c7fa2ad605ce3be9bb49ef7854a27db9ae

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-libs-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: ffd6daaf8d098656d3c1532cd095a1a12fd66e06da88a45fbc1435aaf4baef59

perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: afa4a8be7ce55a59851609bcabca2de0d6517c7a634a3ebf311a8dcd067eff3e

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

python3-perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 29eb4898c1978af7de85f5adaaf4e8ca52946fabbad5dd922dae5482c782577c

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

ppc64le

bpftool-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: c2775af340e804b780a720d888978cc877c64648b4b97f49f2b63944255a2f82

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

kernel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 9dafa91a66ca58c8380106c1f54e016ba01e7ea96f911b88642ce39006ad0d41

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 752c5005da927f4652759823efaf961abc9d01dd0668308ec7de6e88f3e0ec2d

kernel-debug-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: bee6ac1e39be97a0da4d7805d858faa7c95f425b6937ba67f66fe7381f294f15

kernel-debug-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b51a1e1ff740efe8201d5ab0bb0a4f82be7f883522333244d8c22dbee25621a8

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3da506c7205e627ece6c392a75b0fc6f98de53c792b5f8f860dd5e9dfbd2fb3f

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: d8f35d8cd014fe979a89a9c6767d207ccd1d322f560325fe5ec982932f773d6e

kernel-debug-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 58962144a843867c347e0bfdd8a14eeae9c2e6aee0c6d5ab9f0b344bd6bb067c

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 82fa5a5a1528a46d26c74a4b4f4978dcc7afdb2614e40d581536d9cece7f1afa

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: f34ccadd3160951c75fa05aa99bb908bf79bfbe08efaaa22181b32c8b4e71401

kernel-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 309f48f88810b901034f8c1b44c283f4af157d67d7534b9d153f96c09a4fd973

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fcfffabe45001b9e451cb7bf4daae6169db534027c3a1eb45d217bf8039f7b75

kernel-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 515a2257e14d4c47e70648dfea826f81e8529f7a3a00e3e831f688587e2bdddc

kernel-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 74f5dcfc978ffa6e1b31b3fa6a410f5847eb4208911fe6e37066998a142c7b65

kernel-tools-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 76cf66e9cea848af3b0547f8153ce9c7fa2ad605ce3be9bb49ef7854a27db9ae

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-libs-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: ffd6daaf8d098656d3c1532cd095a1a12fd66e06da88a45fbc1435aaf4baef59

perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: afa4a8be7ce55a59851609bcabca2de0d6517c7a634a3ebf311a8dcd067eff3e

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

python3-perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 29eb4898c1978af7de85f5adaaf4e8ca52946fabbad5dd922dae5482c782577c

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

Red Hat Enterprise Linux for ARM 64 9

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

aarch64

bpftool-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0be4d7b2bd066c661855ae121c78ed96ecfbb95433cfe0f2690adb370c8f3356

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

kernel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e235e70ae3ecd2d19e0f1f9c227320bba2f22f77a682de9ed8931afcab3fd2f7

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 2354bb62e719254070485de8f47666c742312a51b45038dca7a313a55b0e11a5

kernel-debug-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 936f7f6cccd1abb0dab48b44ade49182fd25adfeb59536d6b551f59c574d4d26

kernel-debug-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 3b213589c44109f8f2ccc6841dcfe76bccae9419aa3755b253da2ba3bf7fe147

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e7a70407cee1fbdf69200051616b7a2673f3599a3f879a2bfb3e562916c79abd

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 09e6107c2787cf191cc556d68fbf32a21366b51e2bdee2373b550b247fe0612b

kernel-debug-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dc337053609d7de6e42b4fe596edb3583121a565b50c8d9ae4788c81865ed0a7

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 580b0b0fb0d9b60c59669bed6edccab73f0608e3b68dc8b92ff4bf8cf0227aac

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 311081a3da85a6b007319847bde852fb73c740f9812fbcfe10ac72d49ddc2cc7

kernel-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 291fcbc95d46531cb3532f9dbae170226862c4875d338a391c4ccfd6b889689a

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: c150dd881973d522b674565a614b4b84e18ba0c978f8ffec663963b3dfb0a6ac

kernel-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dee22cf3ea29f3262032604e05b49328dd00221ee2732ad398edff7efdeb539b

kernel-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: eb45bb23684c9fc03074874ed27d4b015f435f360bd0d8592c7a3e936b24c7be

kernel-tools-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 39476c1c34af47e29e16e3e75c336caf4272a48dbd3599f2daf86f7ead69ab4d

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-libs-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: be4573c30eee27bea4200914d8a5af9c0e8b8092083eb48af9ead0cb85c95a00

perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 6ed2137fe1576ed65009c5924fe0db87934471e9a825182fc48a8a0d1ff9b95a

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

python3-perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e79ddc2afde8f2d79bfc291a3b5c5d57045b5730fded637f9eace3a5260d5025

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

ppc64le

bpftool-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: c2775af340e804b780a720d888978cc877c64648b4b97f49f2b63944255a2f82

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

kernel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 9dafa91a66ca58c8380106c1f54e016ba01e7ea96f911b88642ce39006ad0d41

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 752c5005da927f4652759823efaf961abc9d01dd0668308ec7de6e88f3e0ec2d

kernel-debug-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: bee6ac1e39be97a0da4d7805d858faa7c95f425b6937ba67f66fe7381f294f15

kernel-debug-core-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b51a1e1ff740efe8201d5ab0bb0a4f82be7f883522333244d8c22dbee25621a8

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debug-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3da506c7205e627ece6c392a75b0fc6f98de53c792b5f8f860dd5e9dfbd2fb3f

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: d8f35d8cd014fe979a89a9c6767d207ccd1d322f560325fe5ec982932f773d6e

kernel-debug-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 58962144a843867c347e0bfdd8a14eeae9c2e6aee0c6d5ab9f0b344bd6bb067c

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 82fa5a5a1528a46d26c74a4b4f4978dcc7afdb2614e40d581536d9cece7f1afa

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: f34ccadd3160951c75fa05aa99bb908bf79bfbe08efaaa22181b32c8b4e71401

kernel-devel-matched-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 309f48f88810b901034f8c1b44c283f4af157d67d7534b9d153f96c09a4fd973

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fcfffabe45001b9e451cb7bf4daae6169db534027c3a1eb45d217bf8039f7b75

kernel-modules-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 515a2257e14d4c47e70648dfea826f81e8529f7a3a00e3e831f688587e2bdddc

kernel-modules-extra-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 74f5dcfc978ffa6e1b31b3fa6a410f5847eb4208911fe6e37066998a142c7b65

kernel-tools-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 76cf66e9cea848af3b0547f8153ce9c7fa2ad605ce3be9bb49ef7854a27db9ae

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-libs-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: ffd6daaf8d098656d3c1532cd095a1a12fd66e06da88a45fbc1435aaf4baef59

perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: afa4a8be7ce55a59851609bcabca2de0d6517c7a634a3ebf311a8dcd067eff3e

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

python3-perf-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 29eb4898c1978af7de85f5adaaf4e8ca52946fabbad5dd922dae5482c782577c

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

Red Hat CodeReady Linux Builder for x86_64 9

SRPM

x86_64

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 21e2c159468c095268c4bd7efa7d5c507ff52c7d2d2b095189dea9550c1085ba

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: ca0b63e8f1a472eab62cd24550c52731e3a3d57ac7ea0b7d48e21728aefa06f3

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM

ppc64le

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

kernel-cross-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 30c565889235178d99b4d2f703a77f0290d2f1114c8113305b35e065009fcbcf

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: dd252561450e33a015ea997cd970c89595a84b1deb76f6dbd1e0ccb4f2aede7e

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM

aarch64

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

kernel-cross-headers-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: ab5e537d3d0a4c1406454a28a7a06a803e7117fbfa34f255bb57ec21a7c0a10b

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 596fa0a0583db2625419f0f52f41e9697ae604430b94dd672a357d562c2b9995

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM

s390x

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

kernel-cross-headers-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 345d05f4be439494c12e43e5acbeb53df590fa5ff653c13913a88bd2f0d184d6

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

aarch64

bpftool-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0be4d7b2bd066c661855ae121c78ed96ecfbb95433cfe0f2690adb370c8f3356

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

kernel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e235e70ae3ecd2d19e0f1f9c227320bba2f22f77a682de9ed8931afcab3fd2f7

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 2354bb62e719254070485de8f47666c742312a51b45038dca7a313a55b0e11a5

kernel-debug-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 936f7f6cccd1abb0dab48b44ade49182fd25adfeb59536d6b551f59c574d4d26

kernel-debug-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 3b213589c44109f8f2ccc6841dcfe76bccae9419aa3755b253da2ba3bf7fe147

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e7a70407cee1fbdf69200051616b7a2673f3599a3f879a2bfb3e562916c79abd

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 09e6107c2787cf191cc556d68fbf32a21366b51e2bdee2373b550b247fe0612b

kernel-debug-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dc337053609d7de6e42b4fe596edb3583121a565b50c8d9ae4788c81865ed0a7

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 580b0b0fb0d9b60c59669bed6edccab73f0608e3b68dc8b92ff4bf8cf0227aac

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 311081a3da85a6b007319847bde852fb73c740f9812fbcfe10ac72d49ddc2cc7

kernel-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 291fcbc95d46531cb3532f9dbae170226862c4875d338a391c4ccfd6b889689a

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: c150dd881973d522b674565a614b4b84e18ba0c978f8ffec663963b3dfb0a6ac

kernel-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dee22cf3ea29f3262032604e05b49328dd00221ee2732ad398edff7efdeb539b

kernel-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: eb45bb23684c9fc03074874ed27d4b015f435f360bd0d8592c7a3e936b24c7be

kernel-tools-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 39476c1c34af47e29e16e3e75c336caf4272a48dbd3599f2daf86f7ead69ab4d

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-libs-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: be4573c30eee27bea4200914d8a5af9c0e8b8092083eb48af9ead0cb85c95a00

perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 6ed2137fe1576ed65009c5924fe0db87934471e9a825182fc48a8a0d1ff9b95a

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

python3-perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e79ddc2afde8f2d79bfc291a3b5c5d57045b5730fded637f9eace3a5260d5025

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

x86_64

bpftool-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3163dbd2be6e35cefd6bb40759c29794612fb87a30fe731755f6a7bb35026840

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

kernel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 23651e85fc03383b9d2075ab60e814f06154a7e4b4f5d397b51a936ef1f32e15

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 530d16d3def3abc8ed570efd5444afe6e9a3ee39a70b3133f9c47370d4765e09

kernel-debug-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bee7c680b5eaeb93389001fbf43abe47abdb9ec6b7fb4267554891dbd423ab65

kernel-debug-core-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: a6acd53bbb32df6915a6164e3261073c589eea88ff1044a72c514b9602ce3d0e

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debug-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: fc52f75dddea225c6258d50033fec03a035722f7dce92d2fe5b4e8f8fa623a17

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: e11d04b8e142180d3af56dae185ba31371d8c8fde12ce2b5cc05d8f9d6759364

kernel-debug-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5b012dfde70d85b8d5587e254dc50b992474c2f9ec5842448cc01181e1807490

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 92ba834740e22f59bd7c3b0161631a1cd70b2c4475aa2575f2b6b8ae1daaf649

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 2600e75af8051e16fac5fc490cd543b8510315bd9c08ca4085ac8fffd2f82b5c

kernel-devel-matched-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 72a86a9dac9b73d3532eeefe31b0ec88458aa28573a8439753741acc2437e66b

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 1674feb9231961f93503241b2249e766bccd9c8637587b5d4009292f203acea7

kernel-modules-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 57597cde32c287b492254c17e85d4360ae314fe1327eac1f11bf550f643ef578

kernel-modules-extra-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 494375eb021b8656daec443ebefe7113f790ea7aab77e100540f4531b0b25526

kernel-tools-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: bae0b89a76bb2a3512e9c5f40a224c2d3c1851147d7916c4c3c3cfab17d080ca

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-libs-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 93183aa8d6aa662c782c3a3ebea060ef84bede17df0462f635dba94ce6cb00bf

perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c840823e73022b6705164e782e26f426f953e5bc7d497e74a90fce00dc45997

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

python3-perf-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 4c3ad303e990675c692e76ce1982a22712e622d0213a039cd09c48afcfe36b89

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0

SRPM

x86_64

bpftool-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: afcc956cd7f6a7d978658a2973a02957c829eaa0277b331cf4342d41baf17c6f

kernel-cross-headers-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 21e2c159468c095268c4bd7efa7d5c507ff52c7d2d2b095189dea9550c1085ba

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 5c081ab4242786557970d7b2f644fde6c46144826b6d656d351fce6053e4557c

kernel-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 08ef0f3d168d323bacb75443471448eefd5d4c2dbcc04a424405e4a7f9462c6e

kernel-debuginfo-common-x86_64-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: b96e05df06fcadc14b385275718e40518e25ee76fc134362e15c2eba75a32754

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 3f857091c9b40d6f8b093fdabfc4f01debe3121591cb0c301cda160a6dc36297

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: ca0b63e8f1a472eab62cd24550c52731e3a3d57ac7ea0b7d48e21728aefa06f3

perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 9953c061baabcb74df396e9e6f7825c6c4509852497f26e66b789c706c9f8b1f

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.x86_64.rpm

SHA-256: 377441a09985e49a2e68b39147d48dc6764a6f62d022937c997d772e5113e619

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0

SRPM

ppc64le

bpftool-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 3504beef8dca56a236afe1ec50b2f45cdf32f2c68894f35e1f63b90157424efa

kernel-cross-headers-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 30c565889235178d99b4d2f703a77f0290d2f1114c8113305b35e065009fcbcf

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: fa394d391db68cb166bc2a5cfbf7d16940ee63d7b27521cb376ca98218eaeed6

kernel-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: b20dcf47eda8b10967de10bbb8623d17cfb3b55fbc55145f2c0a5579e88843f5

kernel-debuginfo-common-ppc64le-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 913a0874fe1ea96d05675ba66a6243adf13b87a56521e8b6c17ba9cf89376f38

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 778a1f0d5f9d2c87b4412d576d5f315c28cf399edcff2e27d3c71f4071ec898c

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: dd252561450e33a015ea997cd970c89595a84b1deb76f6dbd1e0ccb4f2aede7e

perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: 4ef7fa1f636794b0c86789db8e722e4ac61f6839b625d37b8b6bd18d12885758

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.ppc64le.rpm

SHA-256: e76b7e131271a75587c5f3576bc9c61729bfe41104124cf8962726bf4a2f0d47

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0

SRPM

s390x

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

kernel-cross-headers-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 345d05f4be439494c12e43e5acbeb53df590fa5ff653c13913a88bd2f0d184d6

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0

SRPM

aarch64

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

kernel-cross-headers-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: ab5e537d3d0a4c1406454a28a7a06a803e7117fbfa34f255bb57ec21a7c0a10b

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-libs-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 596fa0a0583db2625419f0f52f41e9697ae604430b94dd672a357d562c2b9995

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

aarch64

bpftool-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0be4d7b2bd066c661855ae121c78ed96ecfbb95433cfe0f2690adb370c8f3356

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

bpftool-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 58febf062d54d3844e19e2e7de079cd9d5e8d803ff7767bd1d5e73be48f43a07

kernel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e235e70ae3ecd2d19e0f1f9c227320bba2f22f77a682de9ed8931afcab3fd2f7

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 2354bb62e719254070485de8f47666c742312a51b45038dca7a313a55b0e11a5

kernel-debug-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 936f7f6cccd1abb0dab48b44ade49182fd25adfeb59536d6b551f59c574d4d26

kernel-debug-core-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 3b213589c44109f8f2ccc6841dcfe76bccae9419aa3755b253da2ba3bf7fe147

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 78c0c86d912823772f2eb89609e0f15ee0cec92e45099b4fea77e0c9077214d7

kernel-debug-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e7a70407cee1fbdf69200051616b7a2673f3599a3f879a2bfb3e562916c79abd

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 09e6107c2787cf191cc556d68fbf32a21366b51e2bdee2373b550b247fe0612b

kernel-debug-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dc337053609d7de6e42b4fe596edb3583121a565b50c8d9ae4788c81865ed0a7

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 580b0b0fb0d9b60c59669bed6edccab73f0608e3b68dc8b92ff4bf8cf0227aac

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 4afd6122a7b61b11f5055024c465687d1bb1a113e0906b8881ce15c0599c3186

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-debuginfo-common-aarch64-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 5bdac23f01e3e5cb4896860833b1e9de0d11f915d29bf463e789f1cf3b838b2e

kernel-devel-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 311081a3da85a6b007319847bde852fb73c740f9812fbcfe10ac72d49ddc2cc7

kernel-devel-matched-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 291fcbc95d46531cb3532f9dbae170226862c4875d338a391c4ccfd6b889689a

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: c150dd881973d522b674565a614b4b84e18ba0c978f8ffec663963b3dfb0a6ac

kernel-modules-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: dee22cf3ea29f3262032604e05b49328dd00221ee2732ad398edff7efdeb539b

kernel-modules-extra-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: eb45bb23684c9fc03074874ed27d4b015f435f360bd0d8592c7a3e936b24c7be

kernel-tools-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 39476c1c34af47e29e16e3e75c336caf4272a48dbd3599f2daf86f7ead69ab4d

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 63f76f03ead0f3a2d84a0d0a29ca04f345874722f4cea0267934379ee0192050

kernel-tools-libs-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: be4573c30eee27bea4200914d8a5af9c0e8b8092083eb48af9ead0cb85c95a00

perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 6ed2137fe1576ed65009c5924fe0db87934471e9a825182fc48a8a0d1ff9b95a

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: fe8c10d9aa119a306e60343be4345b876465099f94000ee6db1830afc27862bc

python3-perf-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: e79ddc2afde8f2d79bfc291a3b5c5d57045b5730fded637f9eace3a5260d5025

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.aarch64.rpm

SHA-256: 0c0704d1c0fdc68d014754d9a36ceabe99e4206903a0407166e15cc94c135628

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

kernel-5.14.0-70.17.1.el9_0.src.rpm

SHA-256: bc6e620a995a407fbbea8ec91e976485f93209299592a9d1c4e32f384781a91c

s390x

bpftool-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 4cabcdf646997515771d7044e1e2dd5a0f6d9256603ad30b2f8877fbb6be8d8a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

bpftool-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: fb297ea086bf5d955c1e97fd15a81c4299fd202d0400fce5c2f1a6088aa29b6a

kernel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 80caa6440596f6ffd4bcb6782c6314e3fa3ecfb4809edaf41e8bb67b3a13584a

kernel-abi-stablelists-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 1a466605c2fcbc00c9c1ffd59af63fd5c51067c3fcb860403ff62c4933014c62

kernel-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 22783c0a7e6a5834040ccee971e04701231354f7969b2178b89b9ac502bfd531

kernel-debug-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3f20be4453bf4a1afe5b13e1e973bc9570bb11224b98b26c99fb9ec6464210a7

kernel-debug-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 8579f8cb0ffb3089e23e1fa0ddb7e65707baed14f83914d13a05eb045a12a4d9

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 693624a19e6b13a48831452eeeb6335d30da84f2e8700637b2d15e6d1cb74913

kernel-debug-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 3c9066f2ce2da8d76a89c3b27bfb9a452170a6725a54a10f98bd0c0d7e7419e1

kernel-debug-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 0d13e9cccaa188fd996fb297521c07ef4e2bf60aa1a1cce7805fc0a9468e7fa7

kernel-debug-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bb5594cd6403260d6c90a542006dba93b49801a9468024d1967b8db23ce002c6

kernel-debug-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1da82420fe846c78eeba14adfc5b0f565e158e3bcacb874ed6a92743a2bb19ad

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1f176f940564fe6a41cd90abfc215b97d11f3286f59a9176832793340b7c60b7

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-debuginfo-common-s390x-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f65a13561c324cf25df570c2792b3831f248485e8516b7dee3ce36d8e2a2e3

kernel-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 605bc42bda79b1e103ab0b509ca1cdc617d73cbb1493e0593dcba0491903b806

kernel-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 469ace93bcda0418b8c85d9294292d1638273352d41a60fbc96e83c010f55a8f

kernel-doc-5.14.0-70.17.1.el9_0.noarch.rpm

SHA-256: 534e9c1e1dba8073847931978524a198ed1f9f47dbd5034eee730fffed785d02

kernel-headers-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: ebd6a8d7c18f9307de52285a973b560c183a30a3edd143f0321add37ef52c7fa

kernel-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bce87ce7236440e38f229f7030422917cb44f8dad438d2c0d5b27f9b561dba1e

kernel-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d8f3be2c7bd6e2966e7dd5a375cd8f93660d9f29b335ac9a4bb1ac51825cb3c0

kernel-tools-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 1439ce770f16c08ce8cf4e4177f9826a3e0cb4f09b968b3e65c13727288dce0b

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-tools-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 7753b35cf14963067ec5425914abf324d46dda7cf999432a4ed00d503f52ab05

kernel-zfcpdump-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: b5fbe39caf848a201a7e7c4373c53d0996002436525c8a503721ef4f28f2b4aa

kernel-zfcpdump-core-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: f787934d60a53816b61eabcf245d1030dae1919ee31b3a9b1be9e063f081d015

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 91159aab5c43aee29748b7878167409d1940f44ea1ca56452167ce0f92495343

kernel-zfcpdump-devel-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 94b9ec69fdce47c9af768391602387e3f358f1ad2cd6e108e3fea8526c00b963

kernel-zfcpdump-devel-matched-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcea620847a7a63e2c1150cee8543bcd1c24629cc59587eb3b11586de47104b1

kernel-zfcpdump-modules-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: df8ab6b2b36924109784c19c7f2a1695f0cb3ba5040a448d0c562973555a87c3

kernel-zfcpdump-modules-extra-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c84cccada852ac312c96ca33d5015e3203a4f2dd9545894ff67f156148e0e993

perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: d30f4061b7c45101b11ee19ed2b8550da0e56047eda454a063b4d2b8ff3b7515

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: 829edf6df07c2d87aa87498a4c023c4642f9d597f5d77b38430085cb4b53ed02

python3-perf-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: c62bb97d03c2a5faeef6bc6924cb1b1d14b9bb847e99c27ddbec5301ab66af50

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

python3-perf-debuginfo-5.14.0-70.17.1.el9_0.s390x.rpm

SHA-256: bcd8ab4111f32a2cb3abd1b768e84f8a3df686e43f64bdd814a6571575c81cca

Related news

September 2023: VM courses, Bahasa Indonesia, Russian Podcasts, Goodbye Tinkoff, MS Patch Tuesday, Qualys TOP 20, Linux, Forrester, GigaOm, R-Vision VM

Hello everyone! On the last day of September, I decided to record another retrospective episode on how my Vulnerability Management month went. Alternative video link (for Russia): https://vk.com/video-149273431_456239136 September was quite a busy month for me. Vulnerability Management courses I participated in two educational activities. The first one is an on-line cyber security course for […]

Ubuntu Security Notice USN-5684-1

Ubuntu Security Notice 5684-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6741-01

Red Hat Security Advisory 2022-6741-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

Ubuntu Security Notice USN-5639-1

Ubuntu Security Notice 5639-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5622-1

Ubuntu Security Notice 5622-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5616-1

Ubuntu Security Notice 5616-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

RHSA-2022:6507: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS * CVE-2022-36067: vm2: Sandbox Escape in vm2

Ubuntu Security Notice USN-5602-1

Ubuntu Security Notice 5602-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5594-1

Ubuntu Security Notice 5594-1 - Asaf Modelevsky discovered that the Intel 10GbE PCI Express Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. It was discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6271-01

Red Hat Security Advisory 2022-6271-01 - This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

RHSA-2022:6053: Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update

Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

RHSA-2022:5879: Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key

Red Hat Security Advisory 2022-5730-01

Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.

RHSA-2022:5819: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

Red Hat Security Advisory 2022-5531-01

Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5636-01

Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5565: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

RHSA-2022:5531: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

Red Hat Security Advisory 2022-5439-01

Red Hat Security Advisory 2022-5439-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5476-01

Red Hat Security Advisory 2022-5476-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5476-01

Red Hat Security Advisory 2022-5476-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5439: Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.23

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-25032: zlib: A flaw found in zlib when compressing (not decompressing) certain inputs * CVE-2022-1271: gzip: arbitrary-file-write vulnerability * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2...

Red Hat Security Advisory 2022-5232-01

Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5344-01

Red Hat Security Advisory 2022-5344-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5236-01

Red Hat Security Advisory 2022-5236-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5232: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5344: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5236: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5157: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

Ubuntu Security Notice USN-5469-1

Ubuntu Security Notice 5469-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

CVE-2022-1966

A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.

RHSA-2022:4835: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

RHSA-2022:4809: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code