Headline
RHSA-2023:1221: Red Hat Security Advisory: kernel security, bug fix, and enhancement update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges.
- CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action “mirred”) a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
- CVE-2022-4378: A stack overflow flaw was found in the Linux kernel’s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Synopsis
Important: kernel security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2165648)
Security Fix(es):
- kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
- kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
- kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHEL 8.7 - Outputs of lsmem, lparstat, numactl and /proc/meminfo show wrong value of memory when LMB size is set to 4GB. (BZ#2140092)
- RHEL8.4 - boot: Add secure boot trailer (BZ#2151532)
- Concurrent reading of /proc/cpuinfo by multiple tasks causes soft lockup (BZ#2154441)
- GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155799)
- cgroup: Backport cgroup_mutex performance patches (BZ#2160165)
- Redhat OpenShift: Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160223)
- i40e/iavf: VF reset task fails “Never saw reset” with 5 second timeout per VF (BZ#2160462)
- panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167606)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2150272 - CVE-2022-4269 kernel: net: CPU soft lockup in TC mirred egress-to-ingress action
- BZ - 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
- BZ - 2152548 - CVE-2022-4378 kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
x86_64
bpftool-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0a482a82a01c47c87111b4f0d4412917ef7d030aed01512f117b0153dd841ebb
bpftool-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 391b56bba30a1a2aa7eeb5869127a3cef2b98467d5ac27b720640fcd01be194b
kernel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 07afcbda95cba78168abc6d9fadaa8bfe8ad2323408576ba4b8617b1ad7aca0a
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 808c2ea00c1e556666d25e1219a219f8ea766e7f6225cd8e3ab83ac893b89664
kernel-cross-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0fc135ef0666ab4d720181449abca3c74239aabc78dc8957076481d0b0dda0d8
kernel-debug-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 5acfa97ff293286fa02da2b3182ff9ece2d567dbee17ffad7e51518c8339b426
kernel-debug-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 84e5d42d00aa964ea787b03aea6f68e74622aef4c29acf2c41e9cf93dcac0085
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1df7d468985a6b5d5d69d4ed6e96d61dab60fbba58f1fa2a2081ca1681420c9b
kernel-debug-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0d3e5ac3efad10d579dff6e82d6ba5d20a8a7ca274c40cbed4cfcb3da342d8e7
kernel-debug-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a0a71ac701a7b37c047a6abd488c2f5f98b87c580d45f515219923a4f4b57d0b
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 2396b5d5d8f7ba6f8c3f056141ed9c5dbb44371654003df616a02bdc8f238e3d
kernel-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1b0d94375b33e2cc379f1f66f4dc7a21d2c7713f87e70b53b386d123b96a2fac
kernel-debuginfo-common-x86_64-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: cbea66f9b4d79f99e6b1b93063bb735a88c85158793a825aca72813497c664ea
kernel-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 4e4baa59d7fa97af0d3e2ac4564c366fcc190d4ffb2f1473fc18df4b5e3947d9
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 57121bc50ed8d6b3a4b0211e44276c8f748fea5ab420671ed24a16b179f6d49a
kernel-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 620b5d4ae9457fc8db30ebd3351082d7fa9cb8f8e352c25f0626c3af7bb4e4e0
kernel-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 81d997ba93dcb47ed1cfa91c0bf3db91fcf3bce5167cb06638308d4b75b764d2
kernel-tools-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 8b73729d0eaa9a5e5dced030afb089d8aa29cc6242ab26f4497f7630f9c7655a
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e417ab474b6d8509415ec16cc2fe86f4117028b4560885ee60e856bb787a3bc1
kernel-tools-libs-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 30e260e3c2edb794f08eeda3802b7ab2970b1ccb0619c40b5f91a2cd274ee5ef
perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a65a05442e9ff13edc9b51fb74acade035410048edf8d470b111e1950e51d215
perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: c6f1b109f432bc58b0f4695aecae0325e54c93b17293cd96f69c163dc6df2a90
python3-perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 392365a64ce690b3b906764cc047f32d048379facaf4a10526961c8b3cfcadd4
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e05e59df6aa03a49b7035270df6b1de9101c3518aceb8247d2a36e15632355ce
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
x86_64
bpftool-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0a482a82a01c47c87111b4f0d4412917ef7d030aed01512f117b0153dd841ebb
bpftool-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 391b56bba30a1a2aa7eeb5869127a3cef2b98467d5ac27b720640fcd01be194b
kernel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 07afcbda95cba78168abc6d9fadaa8bfe8ad2323408576ba4b8617b1ad7aca0a
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 808c2ea00c1e556666d25e1219a219f8ea766e7f6225cd8e3ab83ac893b89664
kernel-cross-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0fc135ef0666ab4d720181449abca3c74239aabc78dc8957076481d0b0dda0d8
kernel-debug-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 5acfa97ff293286fa02da2b3182ff9ece2d567dbee17ffad7e51518c8339b426
kernel-debug-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 84e5d42d00aa964ea787b03aea6f68e74622aef4c29acf2c41e9cf93dcac0085
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1df7d468985a6b5d5d69d4ed6e96d61dab60fbba58f1fa2a2081ca1681420c9b
kernel-debug-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0d3e5ac3efad10d579dff6e82d6ba5d20a8a7ca274c40cbed4cfcb3da342d8e7
kernel-debug-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a0a71ac701a7b37c047a6abd488c2f5f98b87c580d45f515219923a4f4b57d0b
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 2396b5d5d8f7ba6f8c3f056141ed9c5dbb44371654003df616a02bdc8f238e3d
kernel-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1b0d94375b33e2cc379f1f66f4dc7a21d2c7713f87e70b53b386d123b96a2fac
kernel-debuginfo-common-x86_64-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: cbea66f9b4d79f99e6b1b93063bb735a88c85158793a825aca72813497c664ea
kernel-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 4e4baa59d7fa97af0d3e2ac4564c366fcc190d4ffb2f1473fc18df4b5e3947d9
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 57121bc50ed8d6b3a4b0211e44276c8f748fea5ab420671ed24a16b179f6d49a
kernel-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 620b5d4ae9457fc8db30ebd3351082d7fa9cb8f8e352c25f0626c3af7bb4e4e0
kernel-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 81d997ba93dcb47ed1cfa91c0bf3db91fcf3bce5167cb06638308d4b75b764d2
kernel-tools-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 8b73729d0eaa9a5e5dced030afb089d8aa29cc6242ab26f4497f7630f9c7655a
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e417ab474b6d8509415ec16cc2fe86f4117028b4560885ee60e856bb787a3bc1
kernel-tools-libs-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 30e260e3c2edb794f08eeda3802b7ab2970b1ccb0619c40b5f91a2cd274ee5ef
perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a65a05442e9ff13edc9b51fb74acade035410048edf8d470b111e1950e51d215
perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: c6f1b109f432bc58b0f4695aecae0325e54c93b17293cd96f69c163dc6df2a90
python3-perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 392365a64ce690b3b906764cc047f32d048379facaf4a10526961c8b3cfcadd4
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e05e59df6aa03a49b7035270df6b1de9101c3518aceb8247d2a36e15632355ce
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
s390x
bpftool-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 12b95a9651ab9aac04f7ba039433ec49a9d7331be080b83bb53392ca36a66432
bpftool-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 9f81643a6a4590aba571615cb79cd464e7b500d2f7c7b9533a945e4d9118f1fe
kernel-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 0121acfdb9e54241707a4711f44f51baf9f77189b83d69e1f316e6cbea2dd5c1
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 803d037aba2c1af41a84f12a26c2a5c36c26e0aa7757b70fba55736478fdac69
kernel-cross-headers-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 9b3493340c4d7c02df12a4aeb0812e7bdb140af36a0e841ec867d77df6476b03
kernel-debug-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 48075f6c458bf4efdf4d1861d3eff4046da4814ebd2f76148e91023958e3c046
kernel-debug-core-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 352062b012300b3011491fa23b119e4081ec7d14f82bf47156b7ace719a4dd46
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 34e284ad73ed4bea16af12f36b45f4a66b7af376c92fd97e38f3f59a1d4bdb72
kernel-debug-devel-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 5ef65e435874c16cac26a007344a61f96bb3110cff346ae35b0854d5ecdff878
kernel-debug-modules-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 09bfd1b84ca2c95f883aac63a63a07e83bbfc301f27293ae46bd67fbe22f1999
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 598484b0232ae58ec3cbb7572958f9e3a82ea3074cd16c4bedceaf96293f850d
kernel-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: c7d4941b76e70e00c2b0754ef4ea838dfb6e5032026fd274ef89bc7f390a34df
kernel-debuginfo-common-s390x-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: d65d3c254dc88580af2e176ee868d67c860b81a84bf94cadeb316e65a0593f8c
kernel-devel-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 733532079ae12794848d361a0c2963185fcaf4ee1fa12c19afa9b88f39c2ba7c
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 57cdcbc292c40a268124a912a12740dfa0e106be2680614216deef23ea14beb4
kernel-modules-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 01b39b29c54a430a2eec5e1fccb2968b4f4599604267b8e0847af8d5a1f2d44d
kernel-modules-extra-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 5399cca0e8ca20e18423f29ec31bd46bc83868c17e3acc700bd72df580dc46a3
kernel-tools-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 45f174e0e59f0132cdbffc33074e36caba50e85a822cc5d100eb6c5cc72b133e
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 72a5c3046524c3f604cd5fa9b2c669d8b8aa6c859d71c679b6184a5b4f0bf24d
kernel-zfcpdump-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 46d4ef3b9c4927e223263503e0b8b3d5d2b3d6f123f88787066cd0b2a534980e
kernel-zfcpdump-core-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 696578a34f9496f564b99f317be096e09af12dba0d96ae991e2a7691cf10ac88
kernel-zfcpdump-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: b0db0cd6678e3df6d1a3d3ad300a4cdb9f60d218f35e73977b12277d13babbee
kernel-zfcpdump-devel-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 267076bea0af0bba1de8c4f8e79f5c2a310f5fe72698d1abba30221b4d98f0f9
kernel-zfcpdump-modules-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 3ca330a0f6dbb2df1aa3309ed58e34963056c1e236ce48d03202ce01f35856d2
kernel-zfcpdump-modules-extra-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 65217080eedfd7d0093c9a0bb8ace4037df4c2c8b8c90535b2e0ef352e88aa1f
perf-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 35f0382f1ba176b79a3c2b4709dfa68cb0075dc3b6053cb0a8c4ae3a0c98efa8
perf-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 8e418e5a038a2fb040f57ae4a1e3370a7fbbea7ac145f96d67d283f1a0fad124
python3-perf-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: 967c5f0bb7685de1e737b202d995eee47e8c0c03c01149fef82c0f9ac2328708
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.s390x.rpm
SHA-256: f3d9716af60904daa9ce711fdca96e0d496e887f749bc4e965b213d17d52bc42
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
ppc64le
bpftool-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 04738409dd5cc8ade9e62765f308137446bdee917325e4d8c7eaef7261507776
bpftool-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: a824349040790cf66d800ce94b3be3f6bd148bc6f91ecb2e9bf293ae48451500
kernel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: d39796d2200812385dcf690a4e15242c5d4354a956721a6a18dbf3603c064953
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 2a872b4f023eaddfdd25ade45bdea9818a23d4266c7f7b93464c8776342aa1a7
kernel-cross-headers-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 753bf02560540b68e729a031494661ca9839dccb0ef4370a7234eb43d55c7967
kernel-debug-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 1f5c1aed18b8f4539f50dd7920425940aa998419c7274a8f4d768adbbe4569e3
kernel-debug-core-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 5d048e34cb555634328ebdaa13e86394f1d8ec45f31991c9cab643b6e1302ef1
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 1be91fef27138142d97f4bbf51dab12598e4bdf92723f95bf36d1afa94cd4ef6
kernel-debug-devel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: ae76fda150207f20f888206dfa351c24ad33b7c361f5402ab962d0a7be1d0132
kernel-debug-modules-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 970c46150532591461ec4437d2ca6aed62af32ae03f6acf01e2985292098d45e
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: b5173386fa3e10038f17c3b895b4c12df57b832833bf027e3d031d633619e1f0
kernel-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 4d2c76ad016bb20698cc6030af98e786e9adcf7b36a66e4cf9e13280e97fd2bb
kernel-debuginfo-common-ppc64le-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 9005c89173af6bbedbd87b7fc3562041f58a9bb7e4669642c0015c90f9cde934
kernel-devel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 605b0c97511a0cc376923359ca65169db739983564350b7aa69ec74d1cc2a464
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: fd1cc208dddc394b9754136142997f6f4fa5769d59571b6d4d6f36c59655e29c
kernel-modules-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 6706dd16e0528b90e0ad9ec669f3305d441f8e99d8e7b0a1e376aeff7c6bd9d8
kernel-modules-extra-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: da2e934863af20476bec0554293bf27f0c1fb1f864833016f7290033a41619c8
kernel-tools-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 8571df8010a0c665a31860607a7e762320a4e164688a6b96005d511874099ed0
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 84afe1ee9a79299f50300a080819c513a2b40d9d34eff82e74865ca358f01cad
kernel-tools-libs-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 4d0aac2241be727da9d1a1c2706d576761def63a92601aa45c9ba1db989d2023
perf-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 57ad75eb1f07b8fe6dfc9d9164e9186ed354996e164d703dcb62b2ef994ec748
perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 37e3ecc9518078eb1d9af89467fea2220063303c84bf4ba6c471d9f0d36c6f5d
python3-perf-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: ba68d00e109ecbc2e9e0e15560b0461e2ee09f0927557aab64db3f53a8729f51
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 0b5add8cbb50d7b54da079abda996b4d2a5e4e42c27f0ace307e75f8ccc72d3c
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
x86_64
bpftool-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0a482a82a01c47c87111b4f0d4412917ef7d030aed01512f117b0153dd841ebb
bpftool-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 391b56bba30a1a2aa7eeb5869127a3cef2b98467d5ac27b720640fcd01be194b
kernel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 07afcbda95cba78168abc6d9fadaa8bfe8ad2323408576ba4b8617b1ad7aca0a
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 808c2ea00c1e556666d25e1219a219f8ea766e7f6225cd8e3ab83ac893b89664
kernel-cross-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0fc135ef0666ab4d720181449abca3c74239aabc78dc8957076481d0b0dda0d8
kernel-debug-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 5acfa97ff293286fa02da2b3182ff9ece2d567dbee17ffad7e51518c8339b426
kernel-debug-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 84e5d42d00aa964ea787b03aea6f68e74622aef4c29acf2c41e9cf93dcac0085
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1df7d468985a6b5d5d69d4ed6e96d61dab60fbba58f1fa2a2081ca1681420c9b
kernel-debug-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0d3e5ac3efad10d579dff6e82d6ba5d20a8a7ca274c40cbed4cfcb3da342d8e7
kernel-debug-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a0a71ac701a7b37c047a6abd488c2f5f98b87c580d45f515219923a4f4b57d0b
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 2396b5d5d8f7ba6f8c3f056141ed9c5dbb44371654003df616a02bdc8f238e3d
kernel-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1b0d94375b33e2cc379f1f66f4dc7a21d2c7713f87e70b53b386d123b96a2fac
kernel-debuginfo-common-x86_64-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: cbea66f9b4d79f99e6b1b93063bb735a88c85158793a825aca72813497c664ea
kernel-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 4e4baa59d7fa97af0d3e2ac4564c366fcc190d4ffb2f1473fc18df4b5e3947d9
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 57121bc50ed8d6b3a4b0211e44276c8f748fea5ab420671ed24a16b179f6d49a
kernel-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 620b5d4ae9457fc8db30ebd3351082d7fa9cb8f8e352c25f0626c3af7bb4e4e0
kernel-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 81d997ba93dcb47ed1cfa91c0bf3db91fcf3bce5167cb06638308d4b75b764d2
kernel-tools-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 8b73729d0eaa9a5e5dced030afb089d8aa29cc6242ab26f4497f7630f9c7655a
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e417ab474b6d8509415ec16cc2fe86f4117028b4560885ee60e856bb787a3bc1
kernel-tools-libs-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 30e260e3c2edb794f08eeda3802b7ab2970b1ccb0619c40b5f91a2cd274ee5ef
perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a65a05442e9ff13edc9b51fb74acade035410048edf8d470b111e1950e51d215
perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: c6f1b109f432bc58b0f4695aecae0325e54c93b17293cd96f69c163dc6df2a90
python3-perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 392365a64ce690b3b906764cc047f32d048379facaf4a10526961c8b3cfcadd4
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e05e59df6aa03a49b7035270df6b1de9101c3518aceb8247d2a36e15632355ce
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
aarch64
bpftool-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: fb6d730a83644a9edf863f9a987f396fd35c1a3f623475cc6736ccdcfe6fe453
bpftool-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 5ccd8c539e39421ceffe7cde6724d765b18d679c7f5fc0d792b45e05b802f562
kernel-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 4b6f35319a7676ddf37ff077687ee1e60cf836efd4d4c9d6f9c6c9c8300683ce
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: e40544a0956e37bdae78f40092fdb8e8e7106ceabcb0cb39c2651ad1ed060c4f
kernel-cross-headers-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: eaabeabea511798c085eeeb3b8c0b4515765756b4ffefd0336df51b55d2183ba
kernel-debug-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: c81174dea77cccaaf0be9672fff0c3c9bccb068b94bd8a1a230683fdfb534e88
kernel-debug-core-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 3993b920cc5c056cd6771f84e0c54842ef4a3c6a83d56ad678ea23b991686e0d
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 5ec5e56fffc7180b0bf807b7134f6c6140156f3b142cb41469c3ee17d3cfe403
kernel-debug-devel-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 86d0c9594bb1d00933251d136bd44a3e227a7ef31cdd48babdc1b7bbd7d2e688
kernel-debug-modules-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: b59225d9d1d898a0f3f0603b124202585ed9e22d937adde5246fb333788aa4fd
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 0f2bb296a23659572df7bde06f44aad2a6b120339ed65c792e19c6145c43b8a8
kernel-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: e22fe90c39dcb1666801c3a005771ec16d241ab48c86fb000a93292da49aa89d
kernel-debuginfo-common-aarch64-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 1a5d48c7ed01b369caac097adaa6490d8f1489b3c6e0ea565b1b5a099a97b9f3
kernel-devel-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: f06b70e6848cc9188e6708a603fb677ad93e366fd1e36d4b46347eebf496781b
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: d93ca3d6eebd0dbdb032c9c0152a3a25e56adec9ce9f21b920e70cca156818bc
kernel-modules-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 89de7be652588c64d9016c76455d8c191f6dcf8ccaacb06c5864353071386150
kernel-modules-extra-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: bf8a66ef81e39d1cb4257c657714b4a5e0ef9ab1cb9724733e016daa7696ecc1
kernel-tools-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: be7dc0d88ef5696e614324642aae64d3c1a1ddc5cabed6c7e9dfef1e82eec6ba
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 1219a082cbb047215645332d24bc53693ff9762045560433dfaf5e8c0f8ebd57
kernel-tools-libs-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: c5ce8abd87d628431c1baf2ae4f859b5c7000f9f828c5b8856d83462dfecfa95
perf-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 8de4a47c5010075ec975cd26a44707f89b75868c5e7d00611c599a679f2a83da
perf-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: bd93bb89ad20d9c75fb846a79c97376eae428ab4624564cdb221f272af73bdb9
python3-perf-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 8365138189eb6c31ee739e026cca8d6c9a0192af6d76341f57d4e890b686584a
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 61ea704199bc6e22996a725065396df4027132ea935712b3642191d08ab3da54
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
ppc64le
bpftool-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 04738409dd5cc8ade9e62765f308137446bdee917325e4d8c7eaef7261507776
bpftool-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: a824349040790cf66d800ce94b3be3f6bd148bc6f91ecb2e9bf293ae48451500
kernel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: d39796d2200812385dcf690a4e15242c5d4354a956721a6a18dbf3603c064953
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 2a872b4f023eaddfdd25ade45bdea9818a23d4266c7f7b93464c8776342aa1a7
kernel-cross-headers-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 753bf02560540b68e729a031494661ca9839dccb0ef4370a7234eb43d55c7967
kernel-debug-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 1f5c1aed18b8f4539f50dd7920425940aa998419c7274a8f4d768adbbe4569e3
kernel-debug-core-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 5d048e34cb555634328ebdaa13e86394f1d8ec45f31991c9cab643b6e1302ef1
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 1be91fef27138142d97f4bbf51dab12598e4bdf92723f95bf36d1afa94cd4ef6
kernel-debug-devel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: ae76fda150207f20f888206dfa351c24ad33b7c361f5402ab962d0a7be1d0132
kernel-debug-modules-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 970c46150532591461ec4437d2ca6aed62af32ae03f6acf01e2985292098d45e
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: b5173386fa3e10038f17c3b895b4c12df57b832833bf027e3d031d633619e1f0
kernel-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 4d2c76ad016bb20698cc6030af98e786e9adcf7b36a66e4cf9e13280e97fd2bb
kernel-debuginfo-common-ppc64le-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 9005c89173af6bbedbd87b7fc3562041f58a9bb7e4669642c0015c90f9cde934
kernel-devel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 605b0c97511a0cc376923359ca65169db739983564350b7aa69ec74d1cc2a464
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: fd1cc208dddc394b9754136142997f6f4fa5769d59571b6d4d6f36c59655e29c
kernel-modules-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 6706dd16e0528b90e0ad9ec669f3305d441f8e99d8e7b0a1e376aeff7c6bd9d8
kernel-modules-extra-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: da2e934863af20476bec0554293bf27f0c1fb1f864833016f7290033a41619c8
kernel-tools-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 8571df8010a0c665a31860607a7e762320a4e164688a6b96005d511874099ed0
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 84afe1ee9a79299f50300a080819c513a2b40d9d34eff82e74865ca358f01cad
kernel-tools-libs-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 4d0aac2241be727da9d1a1c2706d576761def63a92601aa45c9ba1db989d2023
perf-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 57ad75eb1f07b8fe6dfc9d9164e9186ed354996e164d703dcb62b2ef994ec748
perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 37e3ecc9518078eb1d9af89467fea2220063303c84bf4ba6c471d9f0d36c6f5d
python3-perf-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: ba68d00e109ecbc2e9e0e15560b0461e2ee09f0927557aab64db3f53a8729f51
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 0b5add8cbb50d7b54da079abda996b4d2a5e4e42c27f0ace307e75f8ccc72d3c
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.82.1.el8_4.src.rpm
SHA-256: 62c31e54853cc91450e0237d12e8c2f01d5a461c0778eb375cee82834aea59ac
x86_64
bpftool-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0a482a82a01c47c87111b4f0d4412917ef7d030aed01512f117b0153dd841ebb
bpftool-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 391b56bba30a1a2aa7eeb5869127a3cef2b98467d5ac27b720640fcd01be194b
kernel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 07afcbda95cba78168abc6d9fadaa8bfe8ad2323408576ba4b8617b1ad7aca0a
kernel-abi-stablelists-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 58d9d34a9af1a974a7afafab8c867d08f104d3edb934e61ceac05c6222c812be
kernel-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 808c2ea00c1e556666d25e1219a219f8ea766e7f6225cd8e3ab83ac893b89664
kernel-cross-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0fc135ef0666ab4d720181449abca3c74239aabc78dc8957076481d0b0dda0d8
kernel-debug-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 5acfa97ff293286fa02da2b3182ff9ece2d567dbee17ffad7e51518c8339b426
kernel-debug-core-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 84e5d42d00aa964ea787b03aea6f68e74622aef4c29acf2c41e9cf93dcac0085
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1df7d468985a6b5d5d69d4ed6e96d61dab60fbba58f1fa2a2081ca1681420c9b
kernel-debug-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0d3e5ac3efad10d579dff6e82d6ba5d20a8a7ca274c40cbed4cfcb3da342d8e7
kernel-debug-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a0a71ac701a7b37c047a6abd488c2f5f98b87c580d45f515219923a4f4b57d0b
kernel-debug-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 2396b5d5d8f7ba6f8c3f056141ed9c5dbb44371654003df616a02bdc8f238e3d
kernel-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1b0d94375b33e2cc379f1f66f4dc7a21d2c7713f87e70b53b386d123b96a2fac
kernel-debuginfo-common-x86_64-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: cbea66f9b4d79f99e6b1b93063bb735a88c85158793a825aca72813497c664ea
kernel-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 4e4baa59d7fa97af0d3e2ac4564c366fcc190d4ffb2f1473fc18df4b5e3947d9
kernel-doc-4.18.0-305.82.1.el8_4.noarch.rpm
SHA-256: 2450cc4139c3021730246efb5b99c4f505e0e7fec18f7ceef1b44a48e3f98a91
kernel-headers-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 57121bc50ed8d6b3a4b0211e44276c8f748fea5ab420671ed24a16b179f6d49a
kernel-modules-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 620b5d4ae9457fc8db30ebd3351082d7fa9cb8f8e352c25f0626c3af7bb4e4e0
kernel-modules-extra-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 81d997ba93dcb47ed1cfa91c0bf3db91fcf3bce5167cb06638308d4b75b764d2
kernel-tools-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 8b73729d0eaa9a5e5dced030afb089d8aa29cc6242ab26f4497f7630f9c7655a
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e417ab474b6d8509415ec16cc2fe86f4117028b4560885ee60e856bb787a3bc1
kernel-tools-libs-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 30e260e3c2edb794f08eeda3802b7ab2970b1ccb0619c40b5f91a2cd274ee5ef
perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: a65a05442e9ff13edc9b51fb74acade035410048edf8d470b111e1950e51d215
perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: c6f1b109f432bc58b0f4695aecae0325e54c93b17293cd96f69c163dc6df2a90
python3-perf-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 392365a64ce690b3b906764cc047f32d048379facaf4a10526961c8b3cfcadd4
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e05e59df6aa03a49b7035270df6b1de9101c3518aceb8247d2a36e15632355ce
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 391b56bba30a1a2aa7eeb5869127a3cef2b98467d5ac27b720640fcd01be194b
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1df7d468985a6b5d5d69d4ed6e96d61dab60fbba58f1fa2a2081ca1681420c9b
kernel-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 1b0d94375b33e2cc379f1f66f4dc7a21d2c7713f87e70b53b386d123b96a2fac
kernel-debuginfo-common-x86_64-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: cbea66f9b4d79f99e6b1b93063bb735a88c85158793a825aca72813497c664ea
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e417ab474b6d8509415ec16cc2fe86f4117028b4560885ee60e856bb787a3bc1
kernel-tools-libs-devel-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: 0029287de7ccd2e985b32852d02892bdbf1177393583e4bdbaaafb0544a5682c
perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: c6f1b109f432bc58b0f4695aecae0325e54c93b17293cd96f69c163dc6df2a90
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.x86_64.rpm
SHA-256: e05e59df6aa03a49b7035270df6b1de9101c3518aceb8247d2a36e15632355ce
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: a824349040790cf66d800ce94b3be3f6bd148bc6f91ecb2e9bf293ae48451500
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 1be91fef27138142d97f4bbf51dab12598e4bdf92723f95bf36d1afa94cd4ef6
kernel-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 4d2c76ad016bb20698cc6030af98e786e9adcf7b36a66e4cf9e13280e97fd2bb
kernel-debuginfo-common-ppc64le-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 9005c89173af6bbedbd87b7fc3562041f58a9bb7e4669642c0015c90f9cde934
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 84afe1ee9a79299f50300a080819c513a2b40d9d34eff82e74865ca358f01cad
kernel-tools-libs-devel-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 0ed1f683636a64ab15420253ebb6cc5c1c787e64271635c11611cdcbcecc9752
perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 37e3ecc9518078eb1d9af89467fea2220063303c84bf4ba6c471d9f0d36c6f5d
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.ppc64le.rpm
SHA-256: 0b5add8cbb50d7b54da079abda996b4d2a5e4e42c27f0ace307e75f8ccc72d3c
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 5ccd8c539e39421ceffe7cde6724d765b18d679c7f5fc0d792b45e05b802f562
kernel-debug-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 5ec5e56fffc7180b0bf807b7134f6c6140156f3b142cb41469c3ee17d3cfe403
kernel-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: e22fe90c39dcb1666801c3a005771ec16d241ab48c86fb000a93292da49aa89d
kernel-debuginfo-common-aarch64-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 1a5d48c7ed01b369caac097adaa6490d8f1489b3c6e0ea565b1b5a099a97b9f3
kernel-tools-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 1219a082cbb047215645332d24bc53693ff9762045560433dfaf5e8c0f8ebd57
kernel-tools-libs-devel-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 654ffd924f1edea8e75cb23d81420356e9b0a9e862816d713bf650374af274ae
perf-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: bd93bb89ad20d9c75fb846a79c97376eae428ab4624564cdb221f272af73bdb9
python3-perf-debuginfo-4.18.0-305.82.1.el8_4.aarch64.rpm
SHA-256: 61ea704199bc6e22996a725065396df4027132ea935712b3642191d08ab3da54
Related news
Ubuntu Security Notice 6347-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the NTFS file system implementation in the Linux kernel did not properly check buffer indexes in certain situations, leading to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6331-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6312-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Ubuntu Security Notice 6301-1 - It was discovered that the netlink implementation in the Linux kernel did not properly validate policies when parsing attributes in some situations. An attacker could use this to cause a denial of service. Billy Jheng Bing Jhong discovered that the CIFS network file system implementation in the Linux kernel did not properly validate arguments to ioctl in some situations. A local attacker could possibly use this to cause a denial of service.
Red Hat Security Advisory 2023-4151-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-4020-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include double free and use-after-free vulnerabilities.
Ubuntu Security Notice 6187-1 - William Zhao discovered that the Traffic Control subsystem in the Linux kernel did not properly handle network packet retransmission in certain situations. A local attacker could use this to cause a denial of service. It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service.
Red Hat Security Advisory 2023-3495-01 - Logging Subsystem 5.7.2 - Red Hat OpenShift. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-3431-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-3388-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include bypass and use-after-free vulnerabilities.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.6.5 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3841: A Server-Side Request Forgery (SSRF) vulnerability was found in the console API endpoint from Red Hat Advanced Cluster Management for Kubernetes (RHACM). An attacker could take advantage of this as the console API endpoint is missing an authentication check, allowing unauth...
Logging Subsystem 5.6.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-27539: A denial of service vulnerability was found in rubygem-rack in how it parses headers. A carefully crafted input can cause header parsing to take an unexpected amount of time, possibly resulting in a denial of service. * CVE-2023-28120: A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrus...
Red Hat Security Advisory 2023-1666-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2023-1584-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
Red Hat Security Advisory 2023-1393-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.55.
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled docume...
Red Hat OpenShift Container Platform release 4.10.55 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...
Red Hat Security Advisory 2023-1469-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a double free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of se...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack ove...
Red Hat Security Advisory 2023-1221-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1202-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, integer overflow, and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1220-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
An update for kernel is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was found ...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4269: A flaw was fou...
Red Hat Security Advisory 2023-1109-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
Red Hat Security Advisory 2023-1110-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Red Hat Security Advisory 2023-1130-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and use-after-free vulnerabilities.
Red Hat Security Advisory 2023-1101-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-1091-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2964: A flaw was found in the Linux kernel’s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes. * CVE-2022-4269: A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking co...
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially esc...
An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system. * CVE-2022-42703: A memory leak flaw with use-after-free capability was found in the Linux kernel. The VMA mm/rmap.c fun...
Red Hat Security Advisory 2023-0945-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Red Hat Security Advisory 2023-0944-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user triggers a race condition by two malicious flows in the L2CAP bluetooth packets. This flaw allows a local or bluetooth connection user to crash the system or potentially escalate privileges. * CVE-2022-4378: A stack overflow flaw was found in th...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP blue...
An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2873: An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. * CVE-2022-3564: A use-after-free flaw was found in the Linux kernel’s L2CAP bluetoo...
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalat...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4378: A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Ubuntu Security Notice 5789-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5774-1 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 5773-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5754-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
Ubuntu Security Notice 5755-2 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5755-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5754-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a memory leak existed in the IPv6 implementation of the Linux kernel. A local attacker could use this to cause a denial of service.