Headline
RHSA-2023:1554: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-0266: A use-after-free flaw was found in the ALSA subsystem in sound/core/control.c in the Linux kernel. This flaw allows a local attacker to cause a use-after-free issue.
- CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
- kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHEL 8.7: please integrate “powerpc/64/kdump: Limit kdump base to 512MB” patch. (BZ#2154272)
- Redhat OpenShift: Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160222)
- RHEL8.4: s390/kexec: fix ipl report address for kdump (BZ#2166297)
- Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166666)
- mlx5: lag and sriov fixes (BZ#2167648)
- New algorithm limits needed in FIPS mode (BZ#2167771)
- RHEL8.4: dasd: fix no record found for raw_track_access (BZ#2167777)
- kernel panics if iwlwifi firmware can not be loaded (BZ#2169664)
- CSB.V bit never becomes valid for NX Gzip job during LPAR migration (BZ#2170855)
- Backport Request for locking/rwsem commits (BZ#2170940)
- ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172551)
- Hyper-V RHEL8.8: Update MANA driver (BZ#2173104)
- Disable 3DES in FIPS mode (BZ#2176523)
- Soft lockup occurred during __page_mapcount (BZ#2177139)
- Task hangs in blk_mq_get_tag while no tags are in use (BZ#2178225)
- Node locked up and not responsive due to potential rcu stall (BZ#2178273)
Enhancement(s):
- Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168385)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2159505 - CVE-2023-0386 kernel: FUSE filesystem low-privileged user privileges escalation
- BZ - 2163379 - CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
x86_64
bpftool-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 63183c836d75876587de045cb1580746fe93ee28e5d24c38b5b47decf33e2d9b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: debfca3e00c28d97d674586adbd069d4c5fb21b2c546a927aad632352d9f66d0
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 100b77be42602c85ca81f688f60cf44008ae9dc0db9a6a38363c6298de3656a1
kernel-cross-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 842c41aef2eb54091a1a627fdf51cc74701f5ec8ae5ac1761afb2f547fc428c2
kernel-debug-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 39b692ccf9108bc6706f5a989eca8eb9d8140b4419da8d2d63291544abf6e561
kernel-debug-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 0945c657f92729721e088c65b341fcb85ba7c4f6068a81ae48201914bc7c32f9
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debug-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f82cbaf6b37df509bef24548f3f96e7de982adb1da8891e3c1613fb65e6c5204
kernel-debug-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 80194c3d511beb950cd11b7fe4bb5e7d8551aa95648b4af2c99c74ad00216d63
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a2e5aef0b00d0efc8c97f9b4ed00aae31aaefb0186d8f2d127fcfc3b0dcf0b41
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f88bafcb740a25866e7c9d99c577e89cbf77b8972d93df68284abf0aa70273ad
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 368ddbea53383630bf2ee1739a986fcd7df0b0bd4b43d0a91733c2d807a26700
kernel-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 96fa52892921bf3e303552e1ca0d6352c77f0e5daf7432cb113dd4ddab8e0b5e
kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a7b72ea7982093e421b8fc8534c286681525a8f60a17ea6d4c57d1ab21967710
kernel-tools-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9ceeec780446c0719a2e319591918e26862952b979f732e6c1a81893c7c7981a
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 6e54c3accb7f126a6fd9d05e9c706209fc54a7433657bd218c495584edafa164
perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 069acef373a9b2543c6357577e67d4b4013e54618ca2379acea58ff02429bf85
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9cc788de7f39849fe99d51575d1903b942f2535d81bea07e11cce544cb8a8096
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
x86_64
bpftool-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 63183c836d75876587de045cb1580746fe93ee28e5d24c38b5b47decf33e2d9b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: debfca3e00c28d97d674586adbd069d4c5fb21b2c546a927aad632352d9f66d0
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 100b77be42602c85ca81f688f60cf44008ae9dc0db9a6a38363c6298de3656a1
kernel-cross-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 842c41aef2eb54091a1a627fdf51cc74701f5ec8ae5ac1761afb2f547fc428c2
kernel-debug-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 39b692ccf9108bc6706f5a989eca8eb9d8140b4419da8d2d63291544abf6e561
kernel-debug-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 0945c657f92729721e088c65b341fcb85ba7c4f6068a81ae48201914bc7c32f9
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debug-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f82cbaf6b37df509bef24548f3f96e7de982adb1da8891e3c1613fb65e6c5204
kernel-debug-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 80194c3d511beb950cd11b7fe4bb5e7d8551aa95648b4af2c99c74ad00216d63
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a2e5aef0b00d0efc8c97f9b4ed00aae31aaefb0186d8f2d127fcfc3b0dcf0b41
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f88bafcb740a25866e7c9d99c577e89cbf77b8972d93df68284abf0aa70273ad
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 368ddbea53383630bf2ee1739a986fcd7df0b0bd4b43d0a91733c2d807a26700
kernel-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 96fa52892921bf3e303552e1ca0d6352c77f0e5daf7432cb113dd4ddab8e0b5e
kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a7b72ea7982093e421b8fc8534c286681525a8f60a17ea6d4c57d1ab21967710
kernel-tools-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9ceeec780446c0719a2e319591918e26862952b979f732e6c1a81893c7c7981a
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 6e54c3accb7f126a6fd9d05e9c706209fc54a7433657bd218c495584edafa164
perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 069acef373a9b2543c6357577e67d4b4013e54618ca2379acea58ff02429bf85
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9cc788de7f39849fe99d51575d1903b942f2535d81bea07e11cce544cb8a8096
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
s390x
bpftool-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 91fb7372de7bf35b12bd68e86ba026df9fd07cb89c296d5dc8165a39f5860388
bpftool-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 83aefe8abec8dade7b5aa4738122843d4f27d27cdaffadb31f2ec372b82d0b82
kernel-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 84253ff9d8bb3712e06b1c98c3739c5cb144c5bce0a6cf7f0e5948df07f0c004
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 170e8d4962d467e5ed3839b842c0b9a72df912949be7e223fe5959be2d003121
kernel-cross-headers-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: b5cd4de10856fe7a6aef3be4a84d9532009165fd54954df51fbd7672110d74f6
kernel-debug-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 631944b057fcafb1367c8d74b6462515cd79088c9092d9cf60891a10d5d16f7a
kernel-debug-core-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 7029b67b5d17e8163f3d61ea6ea66fce50ee0013745a544ba68891451783b3c4
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 031630ad259d914a457dc7c0ed217d27074499d91fb2f9c30ef8f9df98ed6489
kernel-debug-devel-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 9ad79941f0305c46dd2e84fca2cc6acf6ab933ed02f11b0fb70b58a926b2dd22
kernel-debug-modules-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: a3ff1326454a3535d3b28350fd1b9dc46de4f4d23e2f04abbd61528e82c53adf
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 8f497c186cb959871e9961cae4827a5b77197d68b42f285b7c2ffdecdef47076
kernel-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: b68b651ae45fdc79135600f7aa4c087f7f2b32b88e2d5995d1f08d77ead00ee8
kernel-debuginfo-common-s390x-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 8d226bb517dd6881f750473277ef7ccbaf33e50b7bdd608960b57ddf0fb01074
kernel-devel-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: c9a16d360f0d6ca8ab82b5f52837514395e19c15fd71764cd814046931302310
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: bfe248df4c78d07c3c20d2eb2fb58ceb388563241b4c88eaed884f3e0a806f2b
kernel-modules-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 2b15b971075975f5c617b87c2857a5ee3c48134e209d66d6ddecba2462f91337
kernel-modules-extra-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: ba05f2d88146871f895f9758dc1ac38f3b638df5a4a26c2178759b7ffb385da6
kernel-tools-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: e3409964327edf2e6f36f8ecd10c0c5edce649c180b6c52670dfbc5b8a9ea5cd
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 69974478d802ebcab3cc46c71b7eaed78f8a55f4ea2a4bd8d3bd7a91dfe9afb5
kernel-zfcpdump-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 2c172c113c021ec369abfab0dd70292a658a81affbafb0651a378eb84ebac55b
kernel-zfcpdump-core-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: fe1186271772d604082500b0c62b6343e12a80579992c24f4d2923456d9a5d27
kernel-zfcpdump-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 5ec5e656aa7e6281f87fbe48559408d2834252280ed823366952f40e9f04c3a4
kernel-zfcpdump-devel-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 37837a7fb471e344ca4d2fdbc05860641151f7aaa9f17e3fcd4b75498622bd17
kernel-zfcpdump-modules-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 6af12f9fe1ac0e1b90167ef37b07ec891d89f9454ef105af0205ab50b14749fa
kernel-zfcpdump-modules-extra-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: f02bfa74c51530a304ae4cbd425f634b7d509ebca162735f7483efe2f46c8aa3
perf-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 6f44dc49dfbb78b194deaf4a5c39775ec0929727beeb3066007d003e4273ab60
perf-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 8f5fd4af24c9ab844c14e6dd8bcd1cf53dc2a83eca897bb40f4d945e13ea6970
python3-perf-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 63f91529ee5cc7a69d9e6002b4a0b14424ecce3cf6dc0f910fdb1018906eb409
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.s390x.rpm
SHA-256: 4fe0ad11b23c2c11456996c3742eaa4fbb916f8ea6b8f867c809f4d30b5c9ecf
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
ppc64le
bpftool-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 6f52c146082f9063860329d6b20c3ecf8631fcd2e1406d2bbcf067b7bb00396b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5a9a2eebd2664073e9cddd3f132ba0177d4cdeb46283735ba9938e01411c095f
kernel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 33aec36f7d370dff0fb50aed955913d95914455927dfd4d1827445d6d89f474f
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 456b2c20fd337699483fccd4736f8103f3ec54a4ccd44fab55da83e7daa9e562
kernel-cross-headers-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 727ec7c90a282f3a793bf67108e2826b37007280d90b26510d984657fd8c0776
kernel-debug-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 82047eaccd5447bac802cefe6de70243dba9188bf4bc12e824b16a27ce85dc60
kernel-debug-core-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 75a2028101c5d2909d04f72a128cb331e4e1bfe9fa9012d1c991ce3fce347910
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: fdd721e178cc5d90d8edf5ac227bc860a31fe55febb37fb989f2316d54675291
kernel-debug-devel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: a917d90b21afca69340ad1f5cc790de99ef83394dc4ca08578e3520e0218b031
kernel-debug-modules-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5c3493ecd113b74d7339edd96a62dfe104365b3acbeb3f0141fafdda9cc465e4
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 4ac882134460b2160bf91b706ee03dea068481015cdf4e3389de86e684795d34
kernel-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 61e43c5c7fbdbaddbc328eb2e5d6d511d269b589c0df8ecbf18f020193993767
kernel-debuginfo-common-ppc64le-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 24327e3d5db129ed0f4844af051df32d8e1d5bb33d81727f8effe051317e31d7
kernel-devel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 99387c28cc19c57ab48eec45d20b8aa249e0c87693c0792bf33e6771d9e32a1a
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: d20f79d135ab2dfc5ebce0cdf7f492bbb2ae0ecba7922bc237ff8e565ef9f648
kernel-modules-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 4e4f4d90fb50874def905725f4c75ebc5fa25ac1640fbe9165f62091f38d82a7
kernel-modules-extra-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 8cfd3b10082439c462d0775df4e6078ed65553df577ffde633eed153242a316d
kernel-tools-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 21881ca75b8e3b30b3a7cac4b7a8d405ddbe4e84eaf31f1faebd4ccea9bd6742
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 1db9f9ed0769b8558ada679c30fce12b3766ea5577108546efb9455e7e530f91
kernel-tools-libs-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: f4534456dc3ca0aaad92ceb249e377b2b0e484e4f7c7d29369565e1786b2b347
perf-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: f1a39b41d22cbd474ab7ff3773340c24a50ae4a466533a0615090b6edd8e97c4
perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: e562f25ae110b544f660b8cafebf3a1b46a4058a5ed8f32545b87caa12bed27b
python3-perf-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5acf28c9725f25d7a886ec7004e5c8cc413e5ecb68d3ac5ea0447a229be11f53
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5b0db9941b83cc569c4d40f51a23c4673a4d2bb9dd0adcac0ba60b513e6aa8e8
Red Hat Virtualization Host 4 for RHEL 8
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f88bafcb740a25866e7c9d99c577e89cbf77b8972d93df68284abf0aa70273ad
kernel-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 368ddbea53383630bf2ee1739a986fcd7df0b0bd4b43d0a91733c2d807a26700
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 069acef373a9b2543c6357577e67d4b4013e54618ca2379acea58ff02429bf85
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
x86_64
bpftool-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 63183c836d75876587de045cb1580746fe93ee28e5d24c38b5b47decf33e2d9b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: debfca3e00c28d97d674586adbd069d4c5fb21b2c546a927aad632352d9f66d0
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 100b77be42602c85ca81f688f60cf44008ae9dc0db9a6a38363c6298de3656a1
kernel-cross-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 842c41aef2eb54091a1a627fdf51cc74701f5ec8ae5ac1761afb2f547fc428c2
kernel-debug-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 39b692ccf9108bc6706f5a989eca8eb9d8140b4419da8d2d63291544abf6e561
kernel-debug-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 0945c657f92729721e088c65b341fcb85ba7c4f6068a81ae48201914bc7c32f9
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debug-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f82cbaf6b37df509bef24548f3f96e7de982adb1da8891e3c1613fb65e6c5204
kernel-debug-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 80194c3d511beb950cd11b7fe4bb5e7d8551aa95648b4af2c99c74ad00216d63
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a2e5aef0b00d0efc8c97f9b4ed00aae31aaefb0186d8f2d127fcfc3b0dcf0b41
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f88bafcb740a25866e7c9d99c577e89cbf77b8972d93df68284abf0aa70273ad
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 368ddbea53383630bf2ee1739a986fcd7df0b0bd4b43d0a91733c2d807a26700
kernel-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 96fa52892921bf3e303552e1ca0d6352c77f0e5daf7432cb113dd4ddab8e0b5e
kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a7b72ea7982093e421b8fc8534c286681525a8f60a17ea6d4c57d1ab21967710
kernel-tools-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9ceeec780446c0719a2e319591918e26862952b979f732e6c1a81893c7c7981a
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 6e54c3accb7f126a6fd9d05e9c706209fc54a7433657bd218c495584edafa164
perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 069acef373a9b2543c6357577e67d4b4013e54618ca2379acea58ff02429bf85
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9cc788de7f39849fe99d51575d1903b942f2535d81bea07e11cce544cb8a8096
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
aarch64
bpftool-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 04bfff0ec35c8c5717e056a4e99e18b2fd07a35a1b066491c29938fe35c16a9c
bpftool-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 48c2cc716e5d9ed97a5271d586231f81f8558349b8990368da90e5893b2cce23
kernel-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 32ae515fe39ed72dddfecf8046c77cb937150e145c5d75f96d8b800671d7b3cd
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: c84c2c0e26990705cf4e02d762fa195576db6db1ff7bfed1fc1a3b358ab73f9b
kernel-cross-headers-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 42a53221d9dfa11b7f28f5b0226c68c9e741b7f10a37c547547ae40ab094b562
kernel-debug-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: bdcb89f31beecf878f6ae1b366726bcd0e98211415d4230ce2afcd999c8efcbf
kernel-debug-core-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: ffaf8b107077f11b8ba783d4cf180449d9cadac53d74d3a93968bdc49dce4c69
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 051546c70b23ad775ab086f27168404c621ae193f3f9e3e86239e7487e2ca2be
kernel-debug-devel-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 4710a845341a127830a9911df563f10387962d5d3652a8da2e0492fa304f8ae2
kernel-debug-modules-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 8c0c55a068185a3af46cbcb85d9970487173ba34fae71938a240edf07758e055
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: a94027434339c770185efe81df01924f1f1a45cd2ca2e2d01545ddf4e431c6c4
kernel-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: f64b2b66d42f70be6a56965594d2a9329e2ef3fda2a635c437d140ad0f960a3b
kernel-debuginfo-common-aarch64-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: ac99932d0bd243f6d9f85b6768e43d2cb70a51d7d26599a4327a43723adbdb79
kernel-devel-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 4d8a4d99e1dd0d074846eb98f05bad27df8613b8f39814469b019a7953632862
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 6044a407d328e9fdda2b5663b9cc28ade546466f52638eced777e7a74e1efd7c
kernel-modules-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: f27fcbc2c1b09e58e7352ffede6ce65a3c19ad149bac26d30527f007a59ad6ce
kernel-modules-extra-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: dbe50b5b4112a0d5e8102acd973e1fe09aaf075be2dbab4ec575212aca25dc44
kernel-tools-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: cbcb096580dba143c66f7a36b1d2d6a299592ba1277a8a22aaadaf3da6e2c7f0
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 3519a7808172768143c5716b86d1cbe802b8edf2463079f1056055430ff8ebf7
kernel-tools-libs-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 058e15ff5108a58097a93327a4b0ff4cbc2d1689df9e70399a18f20facea062b
perf-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 2ebb89e4ce9612647b4b7b464fafff089661534762c2b9566ef6a9789b5f121b
perf-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: dc24398e4af8211e4b4e22be8bea23708d319473d545a3f133e10527e36ca68a
python3-perf-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: be403d1c15432967bdbc417804de67064fd64c36077ba63f97fc8b6a8b6f3cae
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: bd22481f2de25f7ae0631151ac94c86a43c9e6a68a3e2e4864b3a0c74b84ef08
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
ppc64le
bpftool-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 6f52c146082f9063860329d6b20c3ecf8631fcd2e1406d2bbcf067b7bb00396b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5a9a2eebd2664073e9cddd3f132ba0177d4cdeb46283735ba9938e01411c095f
kernel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 33aec36f7d370dff0fb50aed955913d95914455927dfd4d1827445d6d89f474f
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 456b2c20fd337699483fccd4736f8103f3ec54a4ccd44fab55da83e7daa9e562
kernel-cross-headers-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 727ec7c90a282f3a793bf67108e2826b37007280d90b26510d984657fd8c0776
kernel-debug-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 82047eaccd5447bac802cefe6de70243dba9188bf4bc12e824b16a27ce85dc60
kernel-debug-core-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 75a2028101c5d2909d04f72a128cb331e4e1bfe9fa9012d1c991ce3fce347910
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: fdd721e178cc5d90d8edf5ac227bc860a31fe55febb37fb989f2316d54675291
kernel-debug-devel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: a917d90b21afca69340ad1f5cc790de99ef83394dc4ca08578e3520e0218b031
kernel-debug-modules-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5c3493ecd113b74d7339edd96a62dfe104365b3acbeb3f0141fafdda9cc465e4
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 4ac882134460b2160bf91b706ee03dea068481015cdf4e3389de86e684795d34
kernel-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 61e43c5c7fbdbaddbc328eb2e5d6d511d269b589c0df8ecbf18f020193993767
kernel-debuginfo-common-ppc64le-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 24327e3d5db129ed0f4844af051df32d8e1d5bb33d81727f8effe051317e31d7
kernel-devel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 99387c28cc19c57ab48eec45d20b8aa249e0c87693c0792bf33e6771d9e32a1a
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: d20f79d135ab2dfc5ebce0cdf7f492bbb2ae0ecba7922bc237ff8e565ef9f648
kernel-modules-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 4e4f4d90fb50874def905725f4c75ebc5fa25ac1640fbe9165f62091f38d82a7
kernel-modules-extra-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 8cfd3b10082439c462d0775df4e6078ed65553df577ffde633eed153242a316d
kernel-tools-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 21881ca75b8e3b30b3a7cac4b7a8d405ddbe4e84eaf31f1faebd4ccea9bd6742
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 1db9f9ed0769b8558ada679c30fce12b3766ea5577108546efb9455e7e530f91
kernel-tools-libs-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: f4534456dc3ca0aaad92ceb249e377b2b0e484e4f7c7d29369565e1786b2b347
perf-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: f1a39b41d22cbd474ab7ff3773340c24a50ae4a466533a0615090b6edd8e97c4
perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: e562f25ae110b544f660b8cafebf3a1b46a4058a5ed8f32545b87caa12bed27b
python3-perf-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5acf28c9725f25d7a886ec7004e5c8cc413e5ecb68d3ac5ea0447a229be11f53
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5b0db9941b83cc569c4d40f51a23c4673a4d2bb9dd0adcac0ba60b513e6aa8e8
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
kernel-4.18.0-372.51.1.el8_6.src.rpm
SHA-256: 9a87ab6335ec6ad559d2ce5bbb3c5b9ae9eaa39f1879dbabca6abcc8546ac615
x86_64
bpftool-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 63183c836d75876587de045cb1580746fe93ee28e5d24c38b5b47decf33e2d9b
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: debfca3e00c28d97d674586adbd069d4c5fb21b2c546a927aad632352d9f66d0
kernel-abi-stablelists-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: 42cd00e4d5068aeff77f13d4f27101ef908a2bc5a27b9a8d4edf77903fafb168
kernel-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 100b77be42602c85ca81f688f60cf44008ae9dc0db9a6a38363c6298de3656a1
kernel-cross-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 842c41aef2eb54091a1a627fdf51cc74701f5ec8ae5ac1761afb2f547fc428c2
kernel-debug-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 39b692ccf9108bc6706f5a989eca8eb9d8140b4419da8d2d63291544abf6e561
kernel-debug-core-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 0945c657f92729721e088c65b341fcb85ba7c4f6068a81ae48201914bc7c32f9
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debug-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f82cbaf6b37df509bef24548f3f96e7de982adb1da8891e3c1613fb65e6c5204
kernel-debug-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 80194c3d511beb950cd11b7fe4bb5e7d8551aa95648b4af2c99c74ad00216d63
kernel-debug-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a2e5aef0b00d0efc8c97f9b4ed00aae31aaefb0186d8f2d127fcfc3b0dcf0b41
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: f88bafcb740a25866e7c9d99c577e89cbf77b8972d93df68284abf0aa70273ad
kernel-doc-4.18.0-372.51.1.el8_6.noarch.rpm
SHA-256: abff42b38f772167b5c07a44e86b82159bd1babe9dad126707545998c81a0806
kernel-headers-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 368ddbea53383630bf2ee1739a986fcd7df0b0bd4b43d0a91733c2d807a26700
kernel-modules-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 96fa52892921bf3e303552e1ca0d6352c77f0e5daf7432cb113dd4ddab8e0b5e
kernel-modules-extra-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: a7b72ea7982093e421b8fc8534c286681525a8f60a17ea6d4c57d1ab21967710
kernel-tools-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9ceeec780446c0719a2e319591918e26862952b979f732e6c1a81893c7c7981a
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
kernel-tools-libs-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 6e54c3accb7f126a6fd9d05e9c706209fc54a7433657bd218c495584edafa164
perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 069acef373a9b2543c6357577e67d4b4013e54618ca2379acea58ff02429bf85
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 9cc788de7f39849fe99d51575d1903b942f2535d81bea07e11cce544cb8a8096
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
bpftool-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: e3f3f374a13e64ed0873a7e2f5048244b288ac0a463321eb82cbd3ef912e2351
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 82d5082c6b0e02501da799ed4a8b0ab9164ca53b5415fc385907780d768a896c
kernel-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 52d9555da64f84dfe94996945b4fff314b722f543365bbc49f4eab42976bad5c
kernel-debuginfo-common-x86_64-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 18ea0f4892af77a512461b646e872455ad68c957bf353377d9db378d029a2b5f
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: c639faf1edce9be5555e6765eccfaddc8fec7fc337127af82a778887ebcd70c1
kernel-tools-libs-devel-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 922d0025c6dcc284e9d94b8bd6013bb4e546894dbd7060f77e41a337e89afb16
perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 8ef36ff1aa60efe3313b297aefd2ce50c7bf514873acb1db59d48e6a32391904
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.x86_64.rpm
SHA-256: 4493653c403cca70da6951fefadec4cc42eaf75f80d3db682a790f2f3c54db8d
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5a9a2eebd2664073e9cddd3f132ba0177d4cdeb46283735ba9938e01411c095f
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: fdd721e178cc5d90d8edf5ac227bc860a31fe55febb37fb989f2316d54675291
kernel-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 61e43c5c7fbdbaddbc328eb2e5d6d511d269b589c0df8ecbf18f020193993767
kernel-debuginfo-common-ppc64le-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 24327e3d5db129ed0f4844af051df32d8e1d5bb33d81727f8effe051317e31d7
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 1db9f9ed0769b8558ada679c30fce12b3766ea5577108546efb9455e7e530f91
kernel-tools-libs-devel-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: acd4703db0ff15a61aaca08aa01f4c0cb683018041383cfd80e9885fe685bc1e
perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: e562f25ae110b544f660b8cafebf3a1b46a4058a5ed8f32545b87caa12bed27b
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.ppc64le.rpm
SHA-256: 5b0db9941b83cc569c4d40f51a23c4673a4d2bb9dd0adcac0ba60b513e6aa8e8
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
bpftool-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 48c2cc716e5d9ed97a5271d586231f81f8558349b8990368da90e5893b2cce23
kernel-debug-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 051546c70b23ad775ab086f27168404c621ae193f3f9e3e86239e7487e2ca2be
kernel-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: f64b2b66d42f70be6a56965594d2a9329e2ef3fda2a635c437d140ad0f960a3b
kernel-debuginfo-common-aarch64-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: ac99932d0bd243f6d9f85b6768e43d2cb70a51d7d26599a4327a43723adbdb79
kernel-tools-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 3519a7808172768143c5716b86d1cbe802b8edf2463079f1056055430ff8ebf7
kernel-tools-libs-devel-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: 3b14e1f9528e520c6645e6ea4f6583e111e4fe9d65b9dfd6a660769afcfae01a
perf-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: dc24398e4af8211e4b4e22be8bea23708d319473d545a3f133e10527e36ca68a
python3-perf-debuginfo-4.18.0-372.51.1.el8_6.aarch64.rpm
SHA-256: bd22481f2de25f7ae0631151ac94c86a43c9e6a68a3e2e4864b3a0c74b84ef08
Related news
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave the way for local privilege escalation attacks. Cloud security firm Wiz, in a report shared with The Hacker News, said the easy-to-exploit shortcomings have the potential to impact 40% of Ubuntu users. "The impacted Ubuntu versions are prevalent in the cloud as they serve as the default
Ubuntu Security Notice 6134-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality.
Ubuntu Security Notice 6072-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Lin Ma discovered a race condition in the io_uring subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6057-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-2083-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Issues addressed include denial of service and server-side request forgery vulnerabilities.
Red Hat Security Advisory 2023-1953-01 - Red Hat OpenShift Logging Subsystem 5.6.5 update. Issues addressed include cross site scripting and denial of service vulnerabilities.
Ubuntu Security Notice 6040-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-1980-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-1984-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges o...
Ubuntu Security Notice 6025-1 - It was discovered that the Traffic-Control Index implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges.
Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0386: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23521: A flaw was found in Git, a distributed revision control system. When parsing gitattributes, a mechanism to allow defining attributes for paths, multiple integer overflows can occur when there is a huge number of path patterns, attributes for a single pattern, ...
Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1660-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-1659-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux So...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-0266: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem. * CVE...
Red Hat Security Advisory 2023-1559-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1557-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1584-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-1554-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Ubuntu Security Notice 5981-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5982-1 - It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
Red Hat Security Advisory 2023-1203-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
Ubuntu Security Notice 5934-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5927-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5924-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5917-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service or execute arbitrary code.
Ubuntu Security Notice 5915-1 - It was discovered that the Upper Level Protocol subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.