Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5626: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
  • CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks
  • CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses
  • CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
  • CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
  • kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
  • kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)
  • kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
  • kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
  • kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Failed to reboot after crash trigger (BZ#2060747)
  • conntrack entries linger around after test (BZ#2066357)
  • Enable nested virtualization (BZ#2079070)
  • slub corruption during LPM of hnv interface (BZ#2081251)
  • sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091)
  • Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083309)
  • ethtool -L may cause system to hang (BZ#2083323)
  • For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139)
  • Affinity broken due to vector space exhaustion (BZ#2084647)
  • kernel memory leak while freeing nested actions (BZ#2086597)
  • sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037)
  • Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539)
  • Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090485)
  • fix missed wake-ups in rq_qos_throttle try two (BZ#2092076)
  • NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334)
  • using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775)
  • Need some changes in RHEL8.x kernels. (BZ#2096932)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
  • BZ - 2035652 - CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks
  • BZ - 2036934 - CVE-2021-4203 kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses
  • BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
  • BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
  • BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVEs

  • CVE-2020-29368
  • CVE-2021-4197
  • CVE-2021-4203
  • CVE-2022-1012
  • CVE-2022-1729
  • CVE-2022-32250

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

x86_64

bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27

bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50

kernel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6

kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f

kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36

kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0

kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee

kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b

kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f

kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699

kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566

kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8

kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e

kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18

kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1

perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f

perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0

python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

x86_64

bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27

bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50

kernel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6

kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f

kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36

kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0

kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee

kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b

kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f

kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699

kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566

kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8

kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e

kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18

kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1

perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f

perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0

python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

s390x

bpftool-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 0c0e50ba5b7806694cbe9138c4dc723ceb6477e7f2c6579837634d7e609e43ed

bpftool-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 95cade415be913c0f4d43e10105ec0c94668e0926743cd73a98a359714fed3b5

kernel-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 3de22feda9431a91af700c996cce59d536b28c921deb80b4dcd12a5a7a406f39

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 17d7f7d429251bdb5f4419416bf13891d3b22599c522538e98402b9c609b29ca

kernel-cross-headers-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 1c0c05417dd0ccb269ae333882884030d240ac4f2d682acdc0a71e3bacd804c3

kernel-debug-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 34bb3fb93af97c1b9ab6345a94a216ba3d31c11c7e243f840b30ef3cea8047bc

kernel-debug-core-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 976d5b7751263a8ed964eee3663ae0fbece0dc1b0162371d0beaa2ee8cadf8de

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 6d46ee626a4a203453cab83311289c78a01bbdd88398bf446eec233121f8de71

kernel-debug-devel-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: f0f0fad7ad7a77c32e1277f0e7d22a0e68b2a9f3f8956f712c1b52b63dc444a9

kernel-debug-modules-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 932605f6d8b870d3af2050ec27526cab16df174cfe534e54dd22668a9262714d

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: c2b418d2a2854b0760686cb509719d2c0154e66caaf1b935b51dbcf0323924ce

kernel-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: f70016cc1d2645a3bc41c1863feddfd1262e9fc2364e900b6a115597501b08ae

kernel-debuginfo-common-s390x-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 6bc7679f5f1dd80f6910ff0a5396a1f3b3e6064317b3bef99356bcf5a0c47ce2

kernel-devel-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 0e18743411a59ee3642725060b7ce52d139138df4d4b53762c3daab81c766068

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 2b8d394121203bc828a05e5b80ec4bc591208b139e9afcf1241de8a0ae1ca8b4

kernel-modules-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: b41b0007e4ea3e25d7a395e3670c694f77dc0e613b62b182b395b650dc0673bf

kernel-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: b8ec1ef11c09f1a21c2a446aff43b36767bf0c98fee741dd9cf11c04d75a9e8f

kernel-tools-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 1e9ecca7c8368d5654fb16e602fa708e3d5b4575720ea1aaa86f39485be57414

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 906e6be844b5e958cf9f85967e6305d72382e17b64edbc0c6e6aa739bcf7bcc3

kernel-zfcpdump-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: de37580435babfd24145ac43c723910ddcd28c6e0f52ebf1fcee69cb1a294213

kernel-zfcpdump-core-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: ac8e6d00b7a5d3936b9cf2ecbf1a8a0d5964372350711ec6ab7ab242f3d1a894

kernel-zfcpdump-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 45ef88e1245b03e153140a505e7ca9ab8c65c562f65e735090da87db35e68d0b

kernel-zfcpdump-devel-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: bb5c24eb2082daab0a3e13dff24da1385ea4af54b3b05569bd01aaf29fa22183

kernel-zfcpdump-modules-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 4b7d1c43f945516424761dde6babd458c8e47194eadc1d3927b164e02c979e8c

kernel-zfcpdump-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 181c1b8c607b4d3a6903389bfbafb0a737518f0ef29843beaf2ab75e1b9aedef

perf-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 7bb04477b5238afdba6e87ad8f4378f621e7aa215bdaf328e265250a7f3bee61

perf-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 6b66ef979d310bab00f8cfff99290822149f815b6cde9ad8d4b89f2c8c19c541

python3-perf-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: 97e8fc070a70ae590afa739b421cb7e6312ac58ca02d5c8aaf582dd55a8e941c

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm

SHA-256: d5898c2e9ef20624806d9e16f00896f88556f8dc6130f5615886f6a68accc615

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

ppc64le

bpftool-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: eb3a1f351b44819db8add452acb6e26c480a0a8ae557d881c72f419f885cf721

bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb

kernel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 15f51294a985719dd1ca3b13ab92fd726f29ccd481ca8b37843fd2e0638673a2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: c78df04dae79f74b3232f6d7fe62b08a47c001682bf655d3ed03712577b457b3

kernel-cross-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 8f4427e2f8211f5de1c4e43be85db4293a476edc1717029790cf278c96eb9562

kernel-debug-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 19a5c07819703fff157018a8c19227d6fef8683f5b46e86e21a322b6c4178823

kernel-debug-core-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e3be129ca69d6106e1defc71e9489f92eb608748978f5aafd54e5de2f30760cd

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755

kernel-debug-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: f40a92eb8b94cef15293929bf4255dea17c5273cfe6b50624814a4f1fe9b3a5b

kernel-debug-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 1a200a39d0b8a1d55a5d0e17140c53ce0496978a9c09e1462c6babed0841809b

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 57536a12857b77c804044bce63af535f807fefd353a849d1188f5dc8efa9d64e

kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b

kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896

kernel-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: f0072ea2addbd06703598fc2f5f32d6993b30eb1a5a4916a7da2fce974647410

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 6de6fb4c85bbd661f6b2d0c3d509ca929b08ee5b68e1c8e77da46ab3d897663a

kernel-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: b2bdbc6d2c0db9943419b2ec8a8370ceca99146b64d63878c08520bb4ded93e9

kernel-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 0506a884b5a7567d5f97b9c67deac523a0c7640407849a8ebb85c5d793d27d05

kernel-tools-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: a5206cef56cdd6796d0ac08e13f6af514b1e12ba18f121bacae8ae2118f601df

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a

kernel-tools-libs-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 395758bbb218ea4ce3663c8174800b69f981c2a36f45ef816cc7a105c1528afa

perf-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 619eebfd86ea6efcd6a3fcf32db4375638ad5bebef6fbf4b83727307d8143167

perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82

python3-perf-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e6db8592ce9127f9390d1ffdc76fafa374f0d58974a20cf3e28a8af75d34ffbf

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

x86_64

bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27

bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50

kernel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6

kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f

kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36

kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0

kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee

kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b

kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f

kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699

kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566

kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8

kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e

kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18

kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1

perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f

perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0

python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

aarch64

bpftool-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: b5a65831e099cf5bdece8b00cb3d3d617d74adb6f4a03805a49aaaaf065b7c05

bpftool-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: e75e2156b71680926f450a5b04e4d8242d86a522cbf8d59b2362913954ab7d55

kernel-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 42e6ef84f234decd86f7dcb8c60b62e303b0fdc68e5d977ac267e726b65d808b

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 1faca6cc5816a10c57ab55169198ad63e7b2585821f00df8f4d4794bfd8c8722

kernel-cross-headers-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: a28bc2394aaf7c449de60b6520b52948175df7cccf00425c2d6eb72833c94b04

kernel-debug-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 96e6aa05920ec57f9d6ef355026fe3886e3d34b99f832c52aba9d7b2f5114339

kernel-debug-core-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 049f52025e974fe9527d8566e86fed8841023a1c9592cf3253f644b6e2261930

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 965dba89cf309d41e18fb091322fed7afa65816a1af54b3f2fd7c2c8c7bb855c

kernel-debug-devel-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 8873292eb12c6ebc84044e006b2087923c4e742614e32ac2268a133d598c5243

kernel-debug-modules-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 9a213e2414ed81215d24e5c014eab7bd0778f57ea9d513071f274de61ae7b2bd

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 8ed69b38959ef41cd10d61c68e5d25b120355a3eb300610c757de0d2ba161035

kernel-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 77f8cac6d31074051f25077229cf2f9ce9ce830756e5c02b3ceb0c958d6944b1

kernel-debuginfo-common-aarch64-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 8e8ccf24d8e12858b6dd3fcc2eaa9c92d2d6dcbbfc250c8ec2c49921682c6d37

kernel-devel-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 2c37c94da588a2cbdf2c4f3119690540e63fe4e75c30bccc3a059f0d536e85bf

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 15bc7ebc155f5d4e41e788cd422486b4064b1b581f7ac4dbd29fe2826c12a8a2

kernel-modules-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 37bc9342e7ab222c7f706d0060a71b5acc4dd9a84ceb286f5ca10dd70e6b56ae

kernel-modules-extra-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 4dd0d1515733839c732f98b85370a9d220055ba6bc38c87c64134319b4d24969

kernel-tools-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: febab86a6ff9665fc6a849426a15056a08b6da6e43e8e0551af91ff2a02986fc

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 821826625662ff889e854a6087602e9fd505c367da06afb6287a28713676dd25

kernel-tools-libs-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: bd7ba43193d850dfea88b8d1e35e6a44d7bb2531202311754579b033d2bfda7d

perf-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 8446ea072523bdf79dba96c61d639ff0c124df682c6d91760d274f6f8c8a2e6d

perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 54081b60b1e33beb750ad2124bc9cd96b3a3b6e7be1e965059fcd8b89eb31281

python3-perf-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 7abc190071f8d6b74cb6182b289658b69c2b96726b39b75162ca83ef2dfb58e3

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 804f6caef77141d37048e055f0ce5baf0acce273bc2e11fc1581d9c8cf057505

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

ppc64le

bpftool-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: eb3a1f351b44819db8add452acb6e26c480a0a8ae557d881c72f419f885cf721

bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb

kernel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 15f51294a985719dd1ca3b13ab92fd726f29ccd481ca8b37843fd2e0638673a2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: c78df04dae79f74b3232f6d7fe62b08a47c001682bf655d3ed03712577b457b3

kernel-cross-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 8f4427e2f8211f5de1c4e43be85db4293a476edc1717029790cf278c96eb9562

kernel-debug-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 19a5c07819703fff157018a8c19227d6fef8683f5b46e86e21a322b6c4178823

kernel-debug-core-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e3be129ca69d6106e1defc71e9489f92eb608748978f5aafd54e5de2f30760cd

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755

kernel-debug-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: f40a92eb8b94cef15293929bf4255dea17c5273cfe6b50624814a4f1fe9b3a5b

kernel-debug-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 1a200a39d0b8a1d55a5d0e17140c53ce0496978a9c09e1462c6babed0841809b

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 57536a12857b77c804044bce63af535f807fefd353a849d1188f5dc8efa9d64e

kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b

kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896

kernel-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: f0072ea2addbd06703598fc2f5f32d6993b30eb1a5a4916a7da2fce974647410

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 6de6fb4c85bbd661f6b2d0c3d509ca929b08ee5b68e1c8e77da46ab3d897663a

kernel-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: b2bdbc6d2c0db9943419b2ec8a8370ceca99146b64d63878c08520bb4ded93e9

kernel-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 0506a884b5a7567d5f97b9c67deac523a0c7640407849a8ebb85c5d793d27d05

kernel-tools-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: a5206cef56cdd6796d0ac08e13f6af514b1e12ba18f121bacae8ae2118f601df

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a

kernel-tools-libs-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 395758bbb218ea4ce3663c8174800b69f981c2a36f45ef816cc7a105c1528afa

perf-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 619eebfd86ea6efcd6a3fcf32db4375638ad5bebef6fbf4b83727307d8143167

perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82

python3-perf-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e6db8592ce9127f9390d1ffdc76fafa374f0d58974a20cf3e28a8af75d34ffbf

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

kernel-4.18.0-305.57.1.el8_4.src.rpm

SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b

x86_64

bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27

bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50

kernel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2

kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a

kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6

kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f

kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36

kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0

kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee

kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e

kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b

kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f

kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699

kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9

kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm

SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb

kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566

kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8

kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e

kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18

kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1

perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f

perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0

python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0

kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f

kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18

kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 1acc0c946fcf6d838cc0f9d34d6305f1fa138b94d077697927cffb151cc358fe

perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm

SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755

kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b

kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a

kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: e05c6e713a863594c32c4977acdec40fe0abeaa9e0f969002337436bc823148b

perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm

SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

bpftool-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: e75e2156b71680926f450a5b04e4d8242d86a522cbf8d59b2362913954ab7d55

kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 965dba89cf309d41e18fb091322fed7afa65816a1af54b3f2fd7c2c8c7bb855c

kernel-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 77f8cac6d31074051f25077229cf2f9ce9ce830756e5c02b3ceb0c958d6944b1

kernel-debuginfo-common-aarch64-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 8e8ccf24d8e12858b6dd3fcc2eaa9c92d2d6dcbbfc250c8ec2c49921682c6d37

kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 821826625662ff889e854a6087602e9fd505c367da06afb6287a28713676dd25

kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 3e84001338f7d4de26e6a4c2184e244312f50f32917ec474bf6c73358bf6aec6

perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 54081b60b1e33beb750ad2124bc9cd96b3a3b6e7be1e965059fcd8b89eb31281

python3-perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm

SHA-256: 804f6caef77141d37048e055f0ce5baf0acce273bc2e11fc1581d9c8cf057505

Related news

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

Ubuntu Security Notice USN-6014-1

Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-6001-1

Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

Ubuntu Security Notice USN-5669-1

Ubuntu Security Notice 5669-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5650-1

Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5639-1

Ubuntu Security Notice 5639-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Ubuntu Security Notice USN-5622-1

Ubuntu Security Notice 5622-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.

Red Hat Security Advisory 2022-6551-01

Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...

RHSA-2022:6551: Red Hat Security Advisory: Red Hat Virtualization security update

An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...

Red Hat Security Advisory 2022-6507-01

Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6432-01

Red Hat Security Advisory 2022-6432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

Red Hat Security Advisory 2022-6370-01

Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.

CVE-2022-1729: security - CVE-2022-1729: race condition in Linux perf subsystem leads to local privilege escalation

A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.

RHSA-2022:6271: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.12 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS

RHSA-2022:6103: Red Hat Security Advisory: OpenShift Container Platform 4.11.1 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

RHSA-2022:6053: Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update

Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6051: Red Hat Security Advisory: Logging Subsystem 5.5.0 - Red Hat OpenShift security update

An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read

RHSA-2022:6073: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

CVE-2022-1012

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

CVE-2022-1012: Invalid Bug ID

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

Red Hat Security Advisory 2022-5806-01

Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5730-01

Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.

Red Hat Security Advisory 2022-5805-01

Red Hat Security Advisory 2022-5805-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

RHSA-2022:5839: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5802: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5804: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5834: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5805: Red Hat Security Advisory: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5730: Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update

Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...

Ubuntu Security Notice USN-5541-1

Ubuntu Security Notice 5541-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2022-5641-01

Red Hat Security Advisory 2022-5641-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5626-01

Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5636-01

Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5633: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...

RHSA-2022:5648: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5641: Red Hat Security Advisory: kpatch-patch security update

An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

RHSA-2022:5636: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root

CVE-2022-26654: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.

CVE-2022-27937: Pexip security bulletins | Pexip Infinity Docs

Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.

Ubuntu Security Notice USN-5515-1

Ubuntu Security Notice 5515-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5513-1

Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

RHSA-2022:5564: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

RHSA-2022:5565: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Ubuntu Security Notice USN-5505-1

Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Ubuntu Security Notice USN-5500-1

Ubuntu Security Notice 5500-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Lin Ma discovered that the NFC Controller Interface implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

Red Hat Security Advisory 2022-5483-01

Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-5483-01

Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5249-01

Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

RHSA-2022:5483: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak

RHSA-2022:5483: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak

Red Hat Security Advisory 2022-5232-01

Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5392-01

Red Hat Security Advisory 2022-5392-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5220-01

Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5214-01

Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5224-01

Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5267-01

Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-5201-01

Red Hat Security Advisory 2022-5201-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which apply security fixes and fix several bugs. Issues addressed include a traversal vulnerability.

RHSA-2022:5220: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5267: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5224: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...

RHSA-2022:5214: Red Hat Security Advisory: kpatch-patch security update

An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code

Red Hat Security Advisory 2022-5157-01

Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.

RHSA-2022:5157: Red Hat Security Advisory: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation

Red Hat Security Advisory 2022-4956-01

Red Hat Security Advisory 2022-4956-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include privilege escalation and traversal vulnerabilities.

Red Hat Security Advisory 2022-4956-01

Red Hat Security Advisory 2022-4956-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include privilege escalation and traversal vulnerabilities.

RHSA-2022:4956: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2021-43816: containerd: Unprivileged pod may bind mount any privileged regular file on disk * CVE-2021-43858: minio: user priv...

RHSA-2022:4956: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2021-43816: containerd: Unprivileged pod may bind mount any privileged regular file on disk * CVE-2021-43858: minio: user priv...

Ubuntu Security Notice USN-5471-1

Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.

CVE-2022-32250: security - Linux Kernel use-after-free write in netfilter

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

RHSA-2022:4814: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.6.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2021-39293: golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)

RHSA-2022:4814: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.6.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2021-39293: golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)

CVE-2021-4203: fix races in sk_peer_pid and sk_peer_cred accesses

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVE-2021-4197: Invalid Bug ID

An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.

CVE-2021-0957: Android Security Bulletin—March 2022

In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550

RHSA-2021:4356: Red Hat Security Advisory: kernel security, bug fix, and enhancement update

An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontroll...

RHSA-2021:4140: Red Hat Security Advisory: kernel-rt security and bug fix update

An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontr...