Headline
RHSA-2022:4809: Red Hat Security Advisory: kpatch-patch security update
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Synopsis
Important: kpatch-patch security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
- kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 2061633 - CVE-2022-27666 kernel: buffer overflow in IPsec ESP transformation code
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
x86_64
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.x86_64.rpm
SHA-256: 631cf012cd2d4622123ce3e6d297afa384cf3de57ff25c4efb202341f9251149
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.x86_64.rpm
SHA-256: a6ccf658352d518d724d2cc225845e31d8f7dc2f31bb2f2aa0d7698dfcc15877
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.x86_64.rpm
SHA-256: 012dba52cc11f7357bd811cddc1aea21ddfec0a2e124ceba231ba293108fbe3c
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.x86_64.rpm
SHA-256: 07d9ae3d7a1b6ae3697b72b04a6da992b04c315023bf630711ddab613c582806
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.x86_64.rpm
SHA-256: 0e8bcc80c15c5365ba61dca5368ae92eb51cb50730bb4a633dece26f5c5dd1f3
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.x86_64.rpm
SHA-256: 426134c5f9935aa1132e4cfe6b3b936dc234a138c15fe15d427c33673af35372
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.x86_64.rpm
SHA-256: bbf228b66c4ed0a1712f9e559351fcb07c29642c660ed6a06817b5653fdf0389
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: 3a809f82a0378fbb8ff4ff70fc6111112776e6d580f1ed76821984ddd19d2f5c
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: ac78696903c37a043c035c442e93ffe10c691804ff1d22ec75501688f9aa0025
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.x86_64.rpm
SHA-256: d5778f9fe585092ee2b15cf293e3d874e341afcc97c4088f8e3d1d29043b1061
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: fb48ef94bd76566c572d575638062e0c7788261b43c548d8950cd243171c821f
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: d8639a10c0455c965d9f450d58dab976279605eab58148456fa61bd0fe508344
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.x86_64.rpm
SHA-256: 2782a698589a642085a9d040960ede0f915fc3a2eb81f37bdb21d89cdc8802bb
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.x86_64.rpm
SHA-256: 02ace2210c63eebbfd29c8d2b08a869752a99117ebb52bba931d7a818083fc11
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.x86_64.rpm
SHA-256: a6d74fccb71736ae8bdbcbdbe21b07b823f0eefa12e8bc4894342dfb88979f2c
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.x86_64.rpm
SHA-256: 84cb1c268d6da12adedcac8c9d53fbc758496943714a4d68e4cc54196bddc774
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 2e86cbc358f64e84394d7b2b4a2d47a1b1dd3f0029e6582e2980658f95565402
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 0fd6834ed02f6c56a3b8447de82ded975a4f4cbbba88d383e4933a6034ad9abd
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.x86_64.rpm
SHA-256: 1c55c58434081c789253b9beba63697d69ecf6e8a0cebdb5dcaa85ae39a5856f
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 214a6335df460f21e03ba5a9720793be67aaceff17f5e32650c4d28ae81600bd
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 45b45d2e04cb7980757426e14e7840981fd4eed6fb910acdd86bafcea8b9ebdd
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.x86_64.rpm
SHA-256: 794b78f9c4b9946584a8818593a8f0164a2ef324b115e74ecc806c5cc7791ef3
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.x86_64.rpm
SHA-256: d290c658e417abcba8698b5af5a4417462c7a77fd30dc5d6d5eca4d7d869991f
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.x86_64.rpm
SHA-256: eb2d174b72f66e372b95278524fb060f653a9a6760a7138818c5d5e0af3525f3
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.x86_64.rpm
SHA-256: 4fda191f760c32bb6ccc2ab68b1f752b37333506379d8fc42a719cd65b2045ad
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.x86_64.rpm
SHA-256: 3a711a98b2caafcc4370af7dc361960c8094640f01404802533cac3841c84fa6
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.x86_64.rpm
SHA-256: 575920f7633dca02f67d9d47fe4c8f5bd6e466c9851ed3e15969639a351bf01e
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.x86_64.rpm
SHA-256: 9efdac71c7eb385fdc1042b00635b8705f81db3b67c1dfed131c55c868899beb
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: afd4217351ba6259e4e881035065b7fef80226b8ca027654c1ab593479788d6d
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 1ded08cba6a608fa4a0bc8916fbb47b5000881c79aed9f09bae2136671630279
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.x86_64.rpm
SHA-256: 99fde686720718ed48c79c8e93b81c801815b84394d44045510fc8109d2e05a3
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: 8274085ac973200e348faaeef26266a97a9d02eaaa46df4e5ff23bee0b32a80b
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 9beee0a35df39c743da97326d29f95e9a60ca00f7c03a74065fc6d853cc58093
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.x86_64.rpm
SHA-256: 6adefdb6b693ea27dfc6310511b42c4c3eb799b89beccaba8ed9268a44865399
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.x86_64.rpm
SHA-256: a2c82e762d978bf27e6802468d9650e5ac45a57a6aae486c952e58ef340ce924
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.x86_64.rpm
SHA-256: 299ec83608db89ad5b84b747aa0991a46d7f6d65e4b7f779fb40584675df32fe
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.x86_64.rpm
SHA-256: a36e5525f923fc5f0c8803dfb70745644549561b1d9f495dbcfe6e69919d31c5
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.x86_64.rpm
SHA-256: 5fb550cc9ef797d8c233f103f83545b257016a151f50266c1731062b7dbd2e80
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.x86_64.rpm
SHA-256: 744647ef52dc90b3334089c697b2009d58eedd620fbfd5760dd6a76455b59d24
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
x86_64
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.x86_64.rpm
SHA-256: 631cf012cd2d4622123ce3e6d297afa384cf3de57ff25c4efb202341f9251149
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.x86_64.rpm
SHA-256: a6ccf658352d518d724d2cc225845e31d8f7dc2f31bb2f2aa0d7698dfcc15877
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.x86_64.rpm
SHA-256: 012dba52cc11f7357bd811cddc1aea21ddfec0a2e124ceba231ba293108fbe3c
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.x86_64.rpm
SHA-256: 07d9ae3d7a1b6ae3697b72b04a6da992b04c315023bf630711ddab613c582806
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.x86_64.rpm
SHA-256: 0e8bcc80c15c5365ba61dca5368ae92eb51cb50730bb4a633dece26f5c5dd1f3
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.x86_64.rpm
SHA-256: 426134c5f9935aa1132e4cfe6b3b936dc234a138c15fe15d427c33673af35372
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.x86_64.rpm
SHA-256: bbf228b66c4ed0a1712f9e559351fcb07c29642c660ed6a06817b5653fdf0389
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: 3a809f82a0378fbb8ff4ff70fc6111112776e6d580f1ed76821984ddd19d2f5c
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: ac78696903c37a043c035c442e93ffe10c691804ff1d22ec75501688f9aa0025
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.x86_64.rpm
SHA-256: d5778f9fe585092ee2b15cf293e3d874e341afcc97c4088f8e3d1d29043b1061
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: fb48ef94bd76566c572d575638062e0c7788261b43c548d8950cd243171c821f
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: d8639a10c0455c965d9f450d58dab976279605eab58148456fa61bd0fe508344
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.x86_64.rpm
SHA-256: 2782a698589a642085a9d040960ede0f915fc3a2eb81f37bdb21d89cdc8802bb
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.x86_64.rpm
SHA-256: 02ace2210c63eebbfd29c8d2b08a869752a99117ebb52bba931d7a818083fc11
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.x86_64.rpm
SHA-256: a6d74fccb71736ae8bdbcbdbe21b07b823f0eefa12e8bc4894342dfb88979f2c
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.x86_64.rpm
SHA-256: 84cb1c268d6da12adedcac8c9d53fbc758496943714a4d68e4cc54196bddc774
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 2e86cbc358f64e84394d7b2b4a2d47a1b1dd3f0029e6582e2980658f95565402
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 0fd6834ed02f6c56a3b8447de82ded975a4f4cbbba88d383e4933a6034ad9abd
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.x86_64.rpm
SHA-256: 1c55c58434081c789253b9beba63697d69ecf6e8a0cebdb5dcaa85ae39a5856f
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 214a6335df460f21e03ba5a9720793be67aaceff17f5e32650c4d28ae81600bd
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 45b45d2e04cb7980757426e14e7840981fd4eed6fb910acdd86bafcea8b9ebdd
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.x86_64.rpm
SHA-256: 794b78f9c4b9946584a8818593a8f0164a2ef324b115e74ecc806c5cc7791ef3
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.x86_64.rpm
SHA-256: d290c658e417abcba8698b5af5a4417462c7a77fd30dc5d6d5eca4d7d869991f
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.x86_64.rpm
SHA-256: eb2d174b72f66e372b95278524fb060f653a9a6760a7138818c5d5e0af3525f3
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.x86_64.rpm
SHA-256: 4fda191f760c32bb6ccc2ab68b1f752b37333506379d8fc42a719cd65b2045ad
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.x86_64.rpm
SHA-256: 3a711a98b2caafcc4370af7dc361960c8094640f01404802533cac3841c84fa6
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.x86_64.rpm
SHA-256: 575920f7633dca02f67d9d47fe4c8f5bd6e466c9851ed3e15969639a351bf01e
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.x86_64.rpm
SHA-256: 9efdac71c7eb385fdc1042b00635b8705f81db3b67c1dfed131c55c868899beb
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: afd4217351ba6259e4e881035065b7fef80226b8ca027654c1ab593479788d6d
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 1ded08cba6a608fa4a0bc8916fbb47b5000881c79aed9f09bae2136671630279
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.x86_64.rpm
SHA-256: 99fde686720718ed48c79c8e93b81c801815b84394d44045510fc8109d2e05a3
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: 8274085ac973200e348faaeef26266a97a9d02eaaa46df4e5ff23bee0b32a80b
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 9beee0a35df39c743da97326d29f95e9a60ca00f7c03a74065fc6d853cc58093
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.x86_64.rpm
SHA-256: 6adefdb6b693ea27dfc6310511b42c4c3eb799b89beccaba8ed9268a44865399
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.x86_64.rpm
SHA-256: a2c82e762d978bf27e6802468d9650e5ac45a57a6aae486c952e58ef340ce924
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.x86_64.rpm
SHA-256: 299ec83608db89ad5b84b747aa0991a46d7f6d65e4b7f779fb40584675df32fe
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.x86_64.rpm
SHA-256: a36e5525f923fc5f0c8803dfb70745644549561b1d9f495dbcfe6e69919d31c5
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.x86_64.rpm
SHA-256: 5fb550cc9ef797d8c233f103f83545b257016a151f50266c1731062b7dbd2e80
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.x86_64.rpm
SHA-256: 744647ef52dc90b3334089c697b2009d58eedd620fbfd5760dd6a76455b59d24
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
ppc64le
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.ppc64le.rpm
SHA-256: b961f0c425bdf4a84282cd1b39e0669ffec6dac619b7f7c1bfaeacd7d4538b09
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.ppc64le.rpm
SHA-256: 9bed79801c1b7c51861db5f6a4954e87a55649a18b14ec170313014f292467a8
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.ppc64le.rpm
SHA-256: 7c285b128521c85fec50715d0f19ea9407e270b22871718d5b6fa3f78745794a
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.ppc64le.rpm
SHA-256: e12d14793970ad6d390f5eb282ebf5b8d70e2fcbe5e07016cec9d84b6518fd65
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.ppc64le.rpm
SHA-256: 480adce1f4786851c60dde4123370a18ed5e2684edec4aa0a099f1340c45f980
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.ppc64le.rpm
SHA-256: fac1a6d6ab8dd220ed005630ea70eb304afd91883d9bda24341a1793f46e3a8e
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.ppc64le.rpm
SHA-256: 7c30cd774d336535580e5896c98daffbed6cc0b2b216ae7aef71656a790b59e9
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.ppc64le.rpm
SHA-256: ad70e3a2ba949c033f012e7e739e987dfc5b23d1e3bfb2f32da1c5ea4c3f542a
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.ppc64le.rpm
SHA-256: 046bdd18b436e964ac73ef2692385c6c641c5d94d52d922ab68990f8480eec6f
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.ppc64le.rpm
SHA-256: 55e5694fb1cb3d6e5ddac5681c252d447b0ef8753639f2594baaeb8b6c0fd436
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.ppc64le.rpm
SHA-256: d03cd39e80520d6669c548197324ab120cce07bda4641e7d736d7a844f281618
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.ppc64le.rpm
SHA-256: 8d3f837a7f9525fba03ea8f563b3ba10d8a2927591997d8842c34daf59713ede
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.ppc64le.rpm
SHA-256: a99c575aea0177d35b472f6b7d07bb5f74bc546841f05d60311f5d213fc1d935
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.ppc64le.rpm
SHA-256: ef719d34bd51deaa469786b626b98be95c941baf1d6ebeac8db475b42b9cd2e3
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.ppc64le.rpm
SHA-256: 0addef84d15f25040cd6c526b9b33f40e7631b689a35e5f8f6f9a657b5a8570f
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.ppc64le.rpm
SHA-256: bffae913dc83abfda1bf47fe58e0c031738f28a39cc5d0f910661287f40510f4
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.ppc64le.rpm
SHA-256: 36b00d4adb32992b1a472cefe4377212e531280ab4b91837a871a8ad39d73d89
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.ppc64le.rpm
SHA-256: 7258863276935f7dfe2439c7954f50113bf27d65ead7dccca749be617b54ae59
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.ppc64le.rpm
SHA-256: ea81ec537ed53e9b5e6252e8ea01093bf3b4bfd039afa3a9e511acef4ef67200
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.ppc64le.rpm
SHA-256: c8eb8077ae0ec34df91fc70b59b66da7a8db3a7ceb1ce7a2890ff8f06b77b203
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.ppc64le.rpm
SHA-256: 582080ef2854850f6ec78b49021263fbcbbbbc3f00413010a6b4b97b7923f416
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.ppc64le.rpm
SHA-256: ed2dd421a67237aef4489c388d4734592d6b110eda5b36bb8a054028230be62e
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.ppc64le.rpm
SHA-256: 25e3f96083b3a0740acecad3f229e19a040328b6a7ffaaa730a0f799a4001c98
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.ppc64le.rpm
SHA-256: d888e9eee07d675a5e19de02dee1cfa8fbbbcebb9e82d07d74d72d26cf986e6e
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.ppc64le.rpm
SHA-256: 8cfdc97d641e431ff7e950b1745a5c500d31fe76bef6a93c68e86d2256bbed1b
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.ppc64le.rpm
SHA-256: 08b0524d4cf7c72e07101b0aa17be43cae6b342d45b435f4023f12fa333452e4
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.ppc64le.rpm
SHA-256: f2064bdd0726dcb18c26ebb226d43b8491cf06c28677ab17f64f70bdca960be3
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.ppc64le.rpm
SHA-256: 547105baaa7b301ee1f9dc752f92665721305ea79acee3f6791ceed75edf5824
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.ppc64le.rpm
SHA-256: fd3715ee8241b6ca0d9b2e1bc55f9f351dc7307bd619f8fceef0d6ddec523c01
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.ppc64le.rpm
SHA-256: d18e0c39dd27b127063721b4d5d687a6fd28d6013ec89fe94d118383bfa88e92
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.ppc64le.rpm
SHA-256: 8dadd09239afec5b1d2eff7aa43f0c89b75b38c3c36faf8847e94838733f560d
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.ppc64le.rpm
SHA-256: e53b83e0059d4ec50a309a0d36e4d3ada0ffd7b484c45d47f74c242cd681fac7
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.ppc64le.rpm
SHA-256: 5373cdfe1a21939fcba5b5c0eb0bd9e19d9d64df0589ceaf7a04e565a662f3fb
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.ppc64le.rpm
SHA-256: fb7fc416535650c3070a7e4c3ae4db4502c85155a8a5b00735d26df8f21bab72
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.ppc64le.rpm
SHA-256: 4863cf394fee71c79fee4c56ba5758bdbbcf5a2e25aeca3c2b6f1021a3be1dc9
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.ppc64le.rpm
SHA-256: 114f0700dacf5e2667cfafe9bd9eded6fa696f63dc0cfb962599ec18acb8d913
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.ppc64le.rpm
SHA-256: 192b1178ce7f4897b112b60d4dbdf4f3d4cca7df529b6e81d961bd6b4dddbcc6
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.ppc64le.rpm
SHA-256: c384058fbac5d8c2253720c5263041e578a9d85d4854aae6d6bf77678472136d
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.ppc64le.rpm
SHA-256: d1c3bd69d70b6f329e44039895ed7124f3e11daf86c6e25ebeb54e7409a3de89
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
x86_64
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.x86_64.rpm
SHA-256: 631cf012cd2d4622123ce3e6d297afa384cf3de57ff25c4efb202341f9251149
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.x86_64.rpm
SHA-256: a6ccf658352d518d724d2cc225845e31d8f7dc2f31bb2f2aa0d7698dfcc15877
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.x86_64.rpm
SHA-256: 012dba52cc11f7357bd811cddc1aea21ddfec0a2e124ceba231ba293108fbe3c
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.x86_64.rpm
SHA-256: 07d9ae3d7a1b6ae3697b72b04a6da992b04c315023bf630711ddab613c582806
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.x86_64.rpm
SHA-256: 0e8bcc80c15c5365ba61dca5368ae92eb51cb50730bb4a633dece26f5c5dd1f3
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.x86_64.rpm
SHA-256: 426134c5f9935aa1132e4cfe6b3b936dc234a138c15fe15d427c33673af35372
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.x86_64.rpm
SHA-256: bbf228b66c4ed0a1712f9e559351fcb07c29642c660ed6a06817b5653fdf0389
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: 3a809f82a0378fbb8ff4ff70fc6111112776e6d580f1ed76821984ddd19d2f5c
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: ac78696903c37a043c035c442e93ffe10c691804ff1d22ec75501688f9aa0025
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.x86_64.rpm
SHA-256: d5778f9fe585092ee2b15cf293e3d874e341afcc97c4088f8e3d1d29043b1061
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: fb48ef94bd76566c572d575638062e0c7788261b43c548d8950cd243171c821f
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: d8639a10c0455c965d9f450d58dab976279605eab58148456fa61bd0fe508344
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.x86_64.rpm
SHA-256: 2782a698589a642085a9d040960ede0f915fc3a2eb81f37bdb21d89cdc8802bb
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.x86_64.rpm
SHA-256: 02ace2210c63eebbfd29c8d2b08a869752a99117ebb52bba931d7a818083fc11
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.x86_64.rpm
SHA-256: a6d74fccb71736ae8bdbcbdbe21b07b823f0eefa12e8bc4894342dfb88979f2c
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.x86_64.rpm
SHA-256: 84cb1c268d6da12adedcac8c9d53fbc758496943714a4d68e4cc54196bddc774
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 2e86cbc358f64e84394d7b2b4a2d47a1b1dd3f0029e6582e2980658f95565402
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 0fd6834ed02f6c56a3b8447de82ded975a4f4cbbba88d383e4933a6034ad9abd
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.x86_64.rpm
SHA-256: 1c55c58434081c789253b9beba63697d69ecf6e8a0cebdb5dcaa85ae39a5856f
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 214a6335df460f21e03ba5a9720793be67aaceff17f5e32650c4d28ae81600bd
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 45b45d2e04cb7980757426e14e7840981fd4eed6fb910acdd86bafcea8b9ebdd
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.x86_64.rpm
SHA-256: 794b78f9c4b9946584a8818593a8f0164a2ef324b115e74ecc806c5cc7791ef3
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.x86_64.rpm
SHA-256: d290c658e417abcba8698b5af5a4417462c7a77fd30dc5d6d5eca4d7d869991f
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.x86_64.rpm
SHA-256: eb2d174b72f66e372b95278524fb060f653a9a6760a7138818c5d5e0af3525f3
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.x86_64.rpm
SHA-256: 4fda191f760c32bb6ccc2ab68b1f752b37333506379d8fc42a719cd65b2045ad
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.x86_64.rpm
SHA-256: 3a711a98b2caafcc4370af7dc361960c8094640f01404802533cac3841c84fa6
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.x86_64.rpm
SHA-256: 575920f7633dca02f67d9d47fe4c8f5bd6e466c9851ed3e15969639a351bf01e
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.x86_64.rpm
SHA-256: 9efdac71c7eb385fdc1042b00635b8705f81db3b67c1dfed131c55c868899beb
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: afd4217351ba6259e4e881035065b7fef80226b8ca027654c1ab593479788d6d
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 1ded08cba6a608fa4a0bc8916fbb47b5000881c79aed9f09bae2136671630279
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.x86_64.rpm
SHA-256: 99fde686720718ed48c79c8e93b81c801815b84394d44045510fc8109d2e05a3
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: 8274085ac973200e348faaeef26266a97a9d02eaaa46df4e5ff23bee0b32a80b
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 9beee0a35df39c743da97326d29f95e9a60ca00f7c03a74065fc6d853cc58093
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.x86_64.rpm
SHA-256: 6adefdb6b693ea27dfc6310511b42c4c3eb799b89beccaba8ed9268a44865399
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.x86_64.rpm
SHA-256: a2c82e762d978bf27e6802468d9650e5ac45a57a6aae486c952e58ef340ce924
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.x86_64.rpm
SHA-256: 299ec83608db89ad5b84b747aa0991a46d7f6d65e4b7f779fb40584675df32fe
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.x86_64.rpm
SHA-256: a36e5525f923fc5f0c8803dfb70745644549561b1d9f495dbcfe6e69919d31c5
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.x86_64.rpm
SHA-256: 5fb550cc9ef797d8c233f103f83545b257016a151f50266c1731062b7dbd2e80
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.x86_64.rpm
SHA-256: 744647ef52dc90b3334089c697b2009d58eedd620fbfd5760dd6a76455b59d24
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
ppc64le
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.ppc64le.rpm
SHA-256: b961f0c425bdf4a84282cd1b39e0669ffec6dac619b7f7c1bfaeacd7d4538b09
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.ppc64le.rpm
SHA-256: 9bed79801c1b7c51861db5f6a4954e87a55649a18b14ec170313014f292467a8
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.ppc64le.rpm
SHA-256: 7c285b128521c85fec50715d0f19ea9407e270b22871718d5b6fa3f78745794a
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.ppc64le.rpm
SHA-256: e12d14793970ad6d390f5eb282ebf5b8d70e2fcbe5e07016cec9d84b6518fd65
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.ppc64le.rpm
SHA-256: 480adce1f4786851c60dde4123370a18ed5e2684edec4aa0a099f1340c45f980
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.ppc64le.rpm
SHA-256: fac1a6d6ab8dd220ed005630ea70eb304afd91883d9bda24341a1793f46e3a8e
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.ppc64le.rpm
SHA-256: 7c30cd774d336535580e5896c98daffbed6cc0b2b216ae7aef71656a790b59e9
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.ppc64le.rpm
SHA-256: ad70e3a2ba949c033f012e7e739e987dfc5b23d1e3bfb2f32da1c5ea4c3f542a
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.ppc64le.rpm
SHA-256: 046bdd18b436e964ac73ef2692385c6c641c5d94d52d922ab68990f8480eec6f
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.ppc64le.rpm
SHA-256: 55e5694fb1cb3d6e5ddac5681c252d447b0ef8753639f2594baaeb8b6c0fd436
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.ppc64le.rpm
SHA-256: d03cd39e80520d6669c548197324ab120cce07bda4641e7d736d7a844f281618
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.ppc64le.rpm
SHA-256: 8d3f837a7f9525fba03ea8f563b3ba10d8a2927591997d8842c34daf59713ede
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.ppc64le.rpm
SHA-256: a99c575aea0177d35b472f6b7d07bb5f74bc546841f05d60311f5d213fc1d935
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.ppc64le.rpm
SHA-256: ef719d34bd51deaa469786b626b98be95c941baf1d6ebeac8db475b42b9cd2e3
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.ppc64le.rpm
SHA-256: 0addef84d15f25040cd6c526b9b33f40e7631b689a35e5f8f6f9a657b5a8570f
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.ppc64le.rpm
SHA-256: bffae913dc83abfda1bf47fe58e0c031738f28a39cc5d0f910661287f40510f4
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.ppc64le.rpm
SHA-256: 36b00d4adb32992b1a472cefe4377212e531280ab4b91837a871a8ad39d73d89
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.ppc64le.rpm
SHA-256: 7258863276935f7dfe2439c7954f50113bf27d65ead7dccca749be617b54ae59
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.ppc64le.rpm
SHA-256: ea81ec537ed53e9b5e6252e8ea01093bf3b4bfd039afa3a9e511acef4ef67200
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.ppc64le.rpm
SHA-256: c8eb8077ae0ec34df91fc70b59b66da7a8db3a7ceb1ce7a2890ff8f06b77b203
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.ppc64le.rpm
SHA-256: 582080ef2854850f6ec78b49021263fbcbbbbc3f00413010a6b4b97b7923f416
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.ppc64le.rpm
SHA-256: ed2dd421a67237aef4489c388d4734592d6b110eda5b36bb8a054028230be62e
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.ppc64le.rpm
SHA-256: 25e3f96083b3a0740acecad3f229e19a040328b6a7ffaaa730a0f799a4001c98
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.ppc64le.rpm
SHA-256: d888e9eee07d675a5e19de02dee1cfa8fbbbcebb9e82d07d74d72d26cf986e6e
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.ppc64le.rpm
SHA-256: 8cfdc97d641e431ff7e950b1745a5c500d31fe76bef6a93c68e86d2256bbed1b
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.ppc64le.rpm
SHA-256: 08b0524d4cf7c72e07101b0aa17be43cae6b342d45b435f4023f12fa333452e4
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.ppc64le.rpm
SHA-256: f2064bdd0726dcb18c26ebb226d43b8491cf06c28677ab17f64f70bdca960be3
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.ppc64le.rpm
SHA-256: 547105baaa7b301ee1f9dc752f92665721305ea79acee3f6791ceed75edf5824
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.ppc64le.rpm
SHA-256: fd3715ee8241b6ca0d9b2e1bc55f9f351dc7307bd619f8fceef0d6ddec523c01
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.ppc64le.rpm
SHA-256: d18e0c39dd27b127063721b4d5d687a6fd28d6013ec89fe94d118383bfa88e92
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.ppc64le.rpm
SHA-256: 8dadd09239afec5b1d2eff7aa43f0c89b75b38c3c36faf8847e94838733f560d
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.ppc64le.rpm
SHA-256: e53b83e0059d4ec50a309a0d36e4d3ada0ffd7b484c45d47f74c242cd681fac7
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.ppc64le.rpm
SHA-256: 5373cdfe1a21939fcba5b5c0eb0bd9e19d9d64df0589ceaf7a04e565a662f3fb
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.ppc64le.rpm
SHA-256: fb7fc416535650c3070a7e4c3ae4db4502c85155a8a5b00735d26df8f21bab72
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.ppc64le.rpm
SHA-256: 4863cf394fee71c79fee4c56ba5758bdbbcf5a2e25aeca3c2b6f1021a3be1dc9
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.ppc64le.rpm
SHA-256: 114f0700dacf5e2667cfafe9bd9eded6fa696f63dc0cfb962599ec18acb8d913
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.ppc64le.rpm
SHA-256: 192b1178ce7f4897b112b60d4dbdf4f3d4cca7df529b6e81d961bd6b4dddbcc6
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.ppc64le.rpm
SHA-256: c384058fbac5d8c2253720c5263041e578a9d85d4854aae6d6bf77678472136d
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.ppc64le.rpm
SHA-256: d1c3bd69d70b6f329e44039895ed7124f3e11daf86c6e25ebeb54e7409a3de89
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.src.rpm
SHA-256: 771de308d2b1353f7d3adca82a6f566a90e9bfd1a60541c42855eb7817c6db3d
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.src.rpm
SHA-256: c3f6e15ebb10e868f2548642d7e6060d9dbce38169779893e388003aadd6c0ee
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.src.rpm
SHA-256: 1b48406e3d40cb8117bb3941785af4b40b8fbd937f9909524f9a202a76ac0a1a
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.src.rpm
SHA-256: d01b4d9e2c864b074ce24d97b3ab4b474c098eb5c34f5c54e1732b056c680345
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.src.rpm
SHA-256: 7730a567bd10e194a03835751c51d11e1fbfe75600b2d5e90fa1d5d5ff8f4b21
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.src.rpm
SHA-256: 9b38d50a3adca5eff3fc3fa12d547b9bbba46dc1d97d87433c4343c6890abccf
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.src.rpm
SHA-256: 8e92db1b84aafd3858b5967ed5cf3dd1ee0d4eee6ce9c8b32409c610e50abed4
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.src.rpm
SHA-256: 26df677c2131c37e3ee34d3338e1ce88cd631c58d58fdc5e392ca66b7b5a15bd
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.src.rpm
SHA-256: 9fe9d8765e70cdc996a32b1ffcf6cde0ed71a096cf428a2f1dbdbe608a415084
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.src.rpm
SHA-256: 274208872a97cf72946ca7f1bcd1bc9f5378fdc45f235d9766368626a2ff8a83
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.src.rpm
SHA-256: 9772ce77899f6ac4bb0b37ba9ca9332b9e658f0ad261cbf1e728ab4b39eefb66
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.src.rpm
SHA-256: 2e33914a810f3e1c46ff51b0b3dbf4c3d07ea5c97f5ba52721426b50de51a954
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.src.rpm
SHA-256: e03e01730129216ec03690a13fced4bfe2cf412f30f800e637d328935efdc9d1
x86_64
kpatch-patch-4_18_0-305_10_2-1-10.el8_4.x86_64.rpm
SHA-256: 631cf012cd2d4622123ce3e6d297afa384cf3de57ff25c4efb202341f9251149
kpatch-patch-4_18_0-305_10_2-debuginfo-1-10.el8_4.x86_64.rpm
SHA-256: a6ccf658352d518d724d2cc225845e31d8f7dc2f31bb2f2aa0d7698dfcc15877
kpatch-patch-4_18_0-305_10_2-debugsource-1-10.el8_4.x86_64.rpm
SHA-256: 012dba52cc11f7357bd811cddc1aea21ddfec0a2e124ceba231ba293108fbe3c
kpatch-patch-4_18_0-305_12_1-1-9.el8_4.x86_64.rpm
SHA-256: 07d9ae3d7a1b6ae3697b72b04a6da992b04c315023bf630711ddab613c582806
kpatch-patch-4_18_0-305_12_1-debuginfo-1-9.el8_4.x86_64.rpm
SHA-256: 0e8bcc80c15c5365ba61dca5368ae92eb51cb50730bb4a633dece26f5c5dd1f3
kpatch-patch-4_18_0-305_12_1-debugsource-1-9.el8_4.x86_64.rpm
SHA-256: 426134c5f9935aa1132e4cfe6b3b936dc234a138c15fe15d427c33673af35372
kpatch-patch-4_18_0-305_17_1-1-8.el8_4.x86_64.rpm
SHA-256: bbf228b66c4ed0a1712f9e559351fcb07c29642c660ed6a06817b5653fdf0389
kpatch-patch-4_18_0-305_17_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: 3a809f82a0378fbb8ff4ff70fc6111112776e6d580f1ed76821984ddd19d2f5c
kpatch-patch-4_18_0-305_17_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: ac78696903c37a043c035c442e93ffe10c691804ff1d22ec75501688f9aa0025
kpatch-patch-4_18_0-305_19_1-1-8.el8_4.x86_64.rpm
SHA-256: d5778f9fe585092ee2b15cf293e3d874e341afcc97c4088f8e3d1d29043b1061
kpatch-patch-4_18_0-305_19_1-debuginfo-1-8.el8_4.x86_64.rpm
SHA-256: fb48ef94bd76566c572d575638062e0c7788261b43c548d8950cd243171c821f
kpatch-patch-4_18_0-305_19_1-debugsource-1-8.el8_4.x86_64.rpm
SHA-256: d8639a10c0455c965d9f450d58dab976279605eab58148456fa61bd0fe508344
kpatch-patch-4_18_0-305_25_1-1-7.el8_4.x86_64.rpm
SHA-256: 2782a698589a642085a9d040960ede0f915fc3a2eb81f37bdb21d89cdc8802bb
kpatch-patch-4_18_0-305_25_1-debuginfo-1-7.el8_4.x86_64.rpm
SHA-256: 02ace2210c63eebbfd29c8d2b08a869752a99117ebb52bba931d7a818083fc11
kpatch-patch-4_18_0-305_25_1-debugsource-1-7.el8_4.x86_64.rpm
SHA-256: a6d74fccb71736ae8bdbcbdbe21b07b823f0eefa12e8bc4894342dfb88979f2c
kpatch-patch-4_18_0-305_28_1-1-5.el8_4.x86_64.rpm
SHA-256: 84cb1c268d6da12adedcac8c9d53fbc758496943714a4d68e4cc54196bddc774
kpatch-patch-4_18_0-305_28_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 2e86cbc358f64e84394d7b2b4a2d47a1b1dd3f0029e6582e2980658f95565402
kpatch-patch-4_18_0-305_28_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 0fd6834ed02f6c56a3b8447de82ded975a4f4cbbba88d383e4933a6034ad9abd
kpatch-patch-4_18_0-305_30_1-1-5.el8_4.x86_64.rpm
SHA-256: 1c55c58434081c789253b9beba63697d69ecf6e8a0cebdb5dcaa85ae39a5856f
kpatch-patch-4_18_0-305_30_1-debuginfo-1-5.el8_4.x86_64.rpm
SHA-256: 214a6335df460f21e03ba5a9720793be67aaceff17f5e32650c4d28ae81600bd
kpatch-patch-4_18_0-305_30_1-debugsource-1-5.el8_4.x86_64.rpm
SHA-256: 45b45d2e04cb7980757426e14e7840981fd4eed6fb910acdd86bafcea8b9ebdd
kpatch-patch-4_18_0-305_34_2-1-3.el8_4.x86_64.rpm
SHA-256: 794b78f9c4b9946584a8818593a8f0164a2ef324b115e74ecc806c5cc7791ef3
kpatch-patch-4_18_0-305_34_2-debuginfo-1-3.el8_4.x86_64.rpm
SHA-256: d290c658e417abcba8698b5af5a4417462c7a77fd30dc5d6d5eca4d7d869991f
kpatch-patch-4_18_0-305_34_2-debugsource-1-3.el8_4.x86_64.rpm
SHA-256: eb2d174b72f66e372b95278524fb060f653a9a6760a7138818c5d5e0af3525f3
kpatch-patch-4_18_0-305_3_1-1-12.el8_4.x86_64.rpm
SHA-256: 4fda191f760c32bb6ccc2ab68b1f752b37333506379d8fc42a719cd65b2045ad
kpatch-patch-4_18_0-305_3_1-debuginfo-1-12.el8_4.x86_64.rpm
SHA-256: 3a711a98b2caafcc4370af7dc361960c8094640f01404802533cac3841c84fa6
kpatch-patch-4_18_0-305_3_1-debugsource-1-12.el8_4.x86_64.rpm
SHA-256: 575920f7633dca02f67d9d47fe4c8f5bd6e466c9851ed3e15969639a351bf01e
kpatch-patch-4_18_0-305_40_1-1-2.el8_4.x86_64.rpm
SHA-256: 9efdac71c7eb385fdc1042b00635b8705f81db3b67c1dfed131c55c868899beb
kpatch-patch-4_18_0-305_40_1-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: afd4217351ba6259e4e881035065b7fef80226b8ca027654c1ab593479788d6d
kpatch-patch-4_18_0-305_40_1-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 1ded08cba6a608fa4a0bc8916fbb47b5000881c79aed9f09bae2136671630279
kpatch-patch-4_18_0-305_40_2-1-2.el8_4.x86_64.rpm
SHA-256: 99fde686720718ed48c79c8e93b81c801815b84394d44045510fc8109d2e05a3
kpatch-patch-4_18_0-305_40_2-debuginfo-1-2.el8_4.x86_64.rpm
SHA-256: 8274085ac973200e348faaeef26266a97a9d02eaaa46df4e5ff23bee0b32a80b
kpatch-patch-4_18_0-305_40_2-debugsource-1-2.el8_4.x86_64.rpm
SHA-256: 9beee0a35df39c743da97326d29f95e9a60ca00f7c03a74065fc6d853cc58093
kpatch-patch-4_18_0-305_45_1-1-1.el8_4.x86_64.rpm
SHA-256: 6adefdb6b693ea27dfc6310511b42c4c3eb799b89beccaba8ed9268a44865399
kpatch-patch-4_18_0-305_45_1-debuginfo-1-1.el8_4.x86_64.rpm
SHA-256: a2c82e762d978bf27e6802468d9650e5ac45a57a6aae486c952e58ef340ce924
kpatch-patch-4_18_0-305_45_1-debugsource-1-1.el8_4.x86_64.rpm
SHA-256: 299ec83608db89ad5b84b747aa0991a46d7f6d65e4b7f779fb40584675df32fe
kpatch-patch-4_18_0-305_7_1-1-11.el8_4.x86_64.rpm
SHA-256: a36e5525f923fc5f0c8803dfb70745644549561b1d9f495dbcfe6e69919d31c5
kpatch-patch-4_18_0-305_7_1-debuginfo-1-11.el8_4.x86_64.rpm
SHA-256: 5fb550cc9ef797d8c233f103f83545b257016a151f50266c1731062b7dbd2e80
kpatch-patch-4_18_0-305_7_1-debugsource-1-11.el8_4.x86_64.rpm
SHA-256: 744647ef52dc90b3334089c697b2009d58eedd620fbfd5760dd6a76455b59d24
Related news
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so ...
Red Hat Security Advisory 2022-6696-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. Issues addressed include crlf injection and denial of service vulnerabilities.
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart.
In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel
Red Hat Security Advisory 2022-5840-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Red Hat Security Advisory 2022-5531-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs.
Logging Subsystem 5.4.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overf...
Red Hat Security Advisory 2022-5344-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-28915: kernel: out-of-bounds read in fbcon_get_font function * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-4942-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4924-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-4835-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4829-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability.
Red Hat Security Advisory 2022-4809-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a buffer overflow vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4037: kernel: security regression for CVE-2018-13405 * CVE-2021-20322: kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.