Headline
RHSA-2022:5626: Red Hat Security Advisory: kernel security and bug fix update
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks
- CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses
- CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
- CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
- CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
- kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
- kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)
- kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
- kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
- kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Failed to reboot after crash trigger (BZ#2060747)
- conntrack entries linger around after test (BZ#2066357)
- Enable nested virtualization (BZ#2079070)
- slub corruption during LPM of hnv interface (BZ#2081251)
- sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091)
- Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083309)
- ethtool -L may cause system to hang (BZ#2083323)
- For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139)
- Affinity broken due to vector space exhaustion (BZ#2084647)
- kernel memory leak while freeing nested actions (BZ#2086597)
- sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037)
- Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539)
- Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090485)
- fix missed wake-ups in rq_qos_throttle try two (BZ#2092076)
- NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334)
- using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775)
- Need some changes in RHEL8.x kernels. (BZ#2096932)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check
- BZ - 2035652 - CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks
- BZ - 2036934 - CVE-2021-4203 kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses
- BZ - 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
- BZ - 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation
- BZ - 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
CVEs
- CVE-2020-29368
- CVE-2021-4197
- CVE-2021-4203
- CVE-2022-1012
- CVE-2022-1729
- CVE-2022-32250
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
x86_64
bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27
bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50
kernel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6
kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f
kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36
kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0
kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee
kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b
kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f
kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699
kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566
kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8
kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e
kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18
kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1
perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f
perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0
python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
x86_64
bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27
bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50
kernel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6
kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f
kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36
kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0
kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee
kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b
kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f
kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699
kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566
kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8
kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e
kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18
kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1
perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f
perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0
python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
s390x
bpftool-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 0c0e50ba5b7806694cbe9138c4dc723ceb6477e7f2c6579837634d7e609e43ed
bpftool-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 95cade415be913c0f4d43e10105ec0c94668e0926743cd73a98a359714fed3b5
kernel-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 3de22feda9431a91af700c996cce59d536b28c921deb80b4dcd12a5a7a406f39
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 17d7f7d429251bdb5f4419416bf13891d3b22599c522538e98402b9c609b29ca
kernel-cross-headers-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 1c0c05417dd0ccb269ae333882884030d240ac4f2d682acdc0a71e3bacd804c3
kernel-debug-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 34bb3fb93af97c1b9ab6345a94a216ba3d31c11c7e243f840b30ef3cea8047bc
kernel-debug-core-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 976d5b7751263a8ed964eee3663ae0fbece0dc1b0162371d0beaa2ee8cadf8de
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 6d46ee626a4a203453cab83311289c78a01bbdd88398bf446eec233121f8de71
kernel-debug-devel-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: f0f0fad7ad7a77c32e1277f0e7d22a0e68b2a9f3f8956f712c1b52b63dc444a9
kernel-debug-modules-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 932605f6d8b870d3af2050ec27526cab16df174cfe534e54dd22668a9262714d
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: c2b418d2a2854b0760686cb509719d2c0154e66caaf1b935b51dbcf0323924ce
kernel-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: f70016cc1d2645a3bc41c1863feddfd1262e9fc2364e900b6a115597501b08ae
kernel-debuginfo-common-s390x-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 6bc7679f5f1dd80f6910ff0a5396a1f3b3e6064317b3bef99356bcf5a0c47ce2
kernel-devel-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 0e18743411a59ee3642725060b7ce52d139138df4d4b53762c3daab81c766068
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 2b8d394121203bc828a05e5b80ec4bc591208b139e9afcf1241de8a0ae1ca8b4
kernel-modules-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: b41b0007e4ea3e25d7a395e3670c694f77dc0e613b62b182b395b650dc0673bf
kernel-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: b8ec1ef11c09f1a21c2a446aff43b36767bf0c98fee741dd9cf11c04d75a9e8f
kernel-tools-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 1e9ecca7c8368d5654fb16e602fa708e3d5b4575720ea1aaa86f39485be57414
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 906e6be844b5e958cf9f85967e6305d72382e17b64edbc0c6e6aa739bcf7bcc3
kernel-zfcpdump-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: de37580435babfd24145ac43c723910ddcd28c6e0f52ebf1fcee69cb1a294213
kernel-zfcpdump-core-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: ac8e6d00b7a5d3936b9cf2ecbf1a8a0d5964372350711ec6ab7ab242f3d1a894
kernel-zfcpdump-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 45ef88e1245b03e153140a505e7ca9ab8c65c562f65e735090da87db35e68d0b
kernel-zfcpdump-devel-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: bb5c24eb2082daab0a3e13dff24da1385ea4af54b3b05569bd01aaf29fa22183
kernel-zfcpdump-modules-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 4b7d1c43f945516424761dde6babd458c8e47194eadc1d3927b164e02c979e8c
kernel-zfcpdump-modules-extra-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 181c1b8c607b4d3a6903389bfbafb0a737518f0ef29843beaf2ab75e1b9aedef
perf-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 7bb04477b5238afdba6e87ad8f4378f621e7aa215bdaf328e265250a7f3bee61
perf-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 6b66ef979d310bab00f8cfff99290822149f815b6cde9ad8d4b89f2c8c19c541
python3-perf-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: 97e8fc070a70ae590afa739b421cb7e6312ac58ca02d5c8aaf582dd55a8e941c
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.s390x.rpm
SHA-256: d5898c2e9ef20624806d9e16f00896f88556f8dc6130f5615886f6a68accc615
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
ppc64le
bpftool-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: eb3a1f351b44819db8add452acb6e26c480a0a8ae557d881c72f419f885cf721
bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb
kernel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 15f51294a985719dd1ca3b13ab92fd726f29ccd481ca8b37843fd2e0638673a2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: c78df04dae79f74b3232f6d7fe62b08a47c001682bf655d3ed03712577b457b3
kernel-cross-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 8f4427e2f8211f5de1c4e43be85db4293a476edc1717029790cf278c96eb9562
kernel-debug-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 19a5c07819703fff157018a8c19227d6fef8683f5b46e86e21a322b6c4178823
kernel-debug-core-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e3be129ca69d6106e1defc71e9489f92eb608748978f5aafd54e5de2f30760cd
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755
kernel-debug-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: f40a92eb8b94cef15293929bf4255dea17c5273cfe6b50624814a4f1fe9b3a5b
kernel-debug-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 1a200a39d0b8a1d55a5d0e17140c53ce0496978a9c09e1462c6babed0841809b
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 57536a12857b77c804044bce63af535f807fefd353a849d1188f5dc8efa9d64e
kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b
kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896
kernel-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: f0072ea2addbd06703598fc2f5f32d6993b30eb1a5a4916a7da2fce974647410
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 6de6fb4c85bbd661f6b2d0c3d509ca929b08ee5b68e1c8e77da46ab3d897663a
kernel-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: b2bdbc6d2c0db9943419b2ec8a8370ceca99146b64d63878c08520bb4ded93e9
kernel-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 0506a884b5a7567d5f97b9c67deac523a0c7640407849a8ebb85c5d793d27d05
kernel-tools-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: a5206cef56cdd6796d0ac08e13f6af514b1e12ba18f121bacae8ae2118f601df
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a
kernel-tools-libs-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 395758bbb218ea4ce3663c8174800b69f981c2a36f45ef816cc7a105c1528afa
perf-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 619eebfd86ea6efcd6a3fcf32db4375638ad5bebef6fbf4b83727307d8143167
perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82
python3-perf-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e6db8592ce9127f9390d1ffdc76fafa374f0d58974a20cf3e28a8af75d34ffbf
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
x86_64
bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27
bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50
kernel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6
kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f
kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36
kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0
kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee
kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b
kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f
kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699
kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566
kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8
kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e
kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18
kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1
perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f
perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0
python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
aarch64
bpftool-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: b5a65831e099cf5bdece8b00cb3d3d617d74adb6f4a03805a49aaaaf065b7c05
bpftool-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: e75e2156b71680926f450a5b04e4d8242d86a522cbf8d59b2362913954ab7d55
kernel-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 42e6ef84f234decd86f7dcb8c60b62e303b0fdc68e5d977ac267e726b65d808b
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 1faca6cc5816a10c57ab55169198ad63e7b2585821f00df8f4d4794bfd8c8722
kernel-cross-headers-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: a28bc2394aaf7c449de60b6520b52948175df7cccf00425c2d6eb72833c94b04
kernel-debug-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 96e6aa05920ec57f9d6ef355026fe3886e3d34b99f832c52aba9d7b2f5114339
kernel-debug-core-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 049f52025e974fe9527d8566e86fed8841023a1c9592cf3253f644b6e2261930
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 965dba89cf309d41e18fb091322fed7afa65816a1af54b3f2fd7c2c8c7bb855c
kernel-debug-devel-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 8873292eb12c6ebc84044e006b2087923c4e742614e32ac2268a133d598c5243
kernel-debug-modules-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 9a213e2414ed81215d24e5c014eab7bd0778f57ea9d513071f274de61ae7b2bd
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 8ed69b38959ef41cd10d61c68e5d25b120355a3eb300610c757de0d2ba161035
kernel-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 77f8cac6d31074051f25077229cf2f9ce9ce830756e5c02b3ceb0c958d6944b1
kernel-debuginfo-common-aarch64-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 8e8ccf24d8e12858b6dd3fcc2eaa9c92d2d6dcbbfc250c8ec2c49921682c6d37
kernel-devel-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 2c37c94da588a2cbdf2c4f3119690540e63fe4e75c30bccc3a059f0d536e85bf
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 15bc7ebc155f5d4e41e788cd422486b4064b1b581f7ac4dbd29fe2826c12a8a2
kernel-modules-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 37bc9342e7ab222c7f706d0060a71b5acc4dd9a84ceb286f5ca10dd70e6b56ae
kernel-modules-extra-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 4dd0d1515733839c732f98b85370a9d220055ba6bc38c87c64134319b4d24969
kernel-tools-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: febab86a6ff9665fc6a849426a15056a08b6da6e43e8e0551af91ff2a02986fc
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 821826625662ff889e854a6087602e9fd505c367da06afb6287a28713676dd25
kernel-tools-libs-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: bd7ba43193d850dfea88b8d1e35e6a44d7bb2531202311754579b033d2bfda7d
perf-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 8446ea072523bdf79dba96c61d639ff0c124df682c6d91760d274f6f8c8a2e6d
perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 54081b60b1e33beb750ad2124bc9cd96b3a3b6e7be1e965059fcd8b89eb31281
python3-perf-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 7abc190071f8d6b74cb6182b289658b69c2b96726b39b75162ca83ef2dfb58e3
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 804f6caef77141d37048e055f0ce5baf0acce273bc2e11fc1581d9c8cf057505
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
ppc64le
bpftool-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: eb3a1f351b44819db8add452acb6e26c480a0a8ae557d881c72f419f885cf721
bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb
kernel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 15f51294a985719dd1ca3b13ab92fd726f29ccd481ca8b37843fd2e0638673a2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: c78df04dae79f74b3232f6d7fe62b08a47c001682bf655d3ed03712577b457b3
kernel-cross-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 8f4427e2f8211f5de1c4e43be85db4293a476edc1717029790cf278c96eb9562
kernel-debug-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 19a5c07819703fff157018a8c19227d6fef8683f5b46e86e21a322b6c4178823
kernel-debug-core-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e3be129ca69d6106e1defc71e9489f92eb608748978f5aafd54e5de2f30760cd
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755
kernel-debug-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: f40a92eb8b94cef15293929bf4255dea17c5273cfe6b50624814a4f1fe9b3a5b
kernel-debug-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 1a200a39d0b8a1d55a5d0e17140c53ce0496978a9c09e1462c6babed0841809b
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 57536a12857b77c804044bce63af535f807fefd353a849d1188f5dc8efa9d64e
kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b
kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896
kernel-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: f0072ea2addbd06703598fc2f5f32d6993b30eb1a5a4916a7da2fce974647410
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 6de6fb4c85bbd661f6b2d0c3d509ca929b08ee5b68e1c8e77da46ab3d897663a
kernel-modules-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: b2bdbc6d2c0db9943419b2ec8a8370ceca99146b64d63878c08520bb4ded93e9
kernel-modules-extra-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 0506a884b5a7567d5f97b9c67deac523a0c7640407849a8ebb85c5d793d27d05
kernel-tools-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: a5206cef56cdd6796d0ac08e13f6af514b1e12ba18f121bacae8ae2118f601df
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a
kernel-tools-libs-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 395758bbb218ea4ce3663c8174800b69f981c2a36f45ef816cc7a105c1528afa
perf-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 619eebfd86ea6efcd6a3fcf32db4375638ad5bebef6fbf4b83727307d8143167
perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82
python3-perf-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e6db8592ce9127f9390d1ffdc76fafa374f0d58974a20cf3e28a8af75d34ffbf
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
kernel-4.18.0-305.57.1.el8_4.src.rpm
SHA-256: e22e056dc19035b4945338d9961a823ad2ae00774c81553b09564df6ce06c86b
x86_64
bpftool-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46324407dacadb32b691ac2484cdcae2113cc9f396992464bc7dda919f54fe27
bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50
kernel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 46dcff2b8b8aad5444608c4d209c081fb71247b5459fc8609a2755cc05a8eab2
kernel-abi-stablelists-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 371472f86825dd91b2e0e4242799a7b504229cae1806d44f6a6dc50898fdcc6a
kernel-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: deca479196c3556f6e67c310a23bdce4d41c9db97e7fdbdc4f925e83f75dbbe6
kernel-cross-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 68b5ba7d988057dc69464173613afd850f2f22038f2e33ac8c7deacae7c94c9f
kernel-debug-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bdb22a413fc6cceb2b28977da54d2209fc891388ce95d750fed72a4d39ad5e36
kernel-debug-core-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c291201508c431353bbdcef85d092e39d767c41c1dd7023d10d9b8362f626a1c
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0
kernel-debug-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: c2fca31ccd11f677a99b0f32036ca067f30ae1f70f2f94b936310eb0390919ee
kernel-debug-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: accbe02f1820c4372ccce4ef35dbdc8c9e4665c5861a126b96ba5a8b5317856e
kernel-debug-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 21f973f9a6e6c4a99d16f319daeb980085d7762feb99183796779375eefbe44b
kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f
kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699
kernel-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8aa4198c8cec192a196121ba6ff96eec203aeb60b671b238db9eb26674b833f9
kernel-doc-4.18.0-305.57.1.el8_4.noarch.rpm
SHA-256: 0285d8605b9de1c29e31ee03596c4b5f81d7c664319b5e72b73266c5edaf55cb
kernel-headers-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f4d30f7ad169e3e71ee89e2847c1b2b1d1d16c4701ab6daa91020735bd94566
kernel-modules-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 3f7050dac77cf7846e56611b9167e126c3a142e87c98ed279a959ab4f6cb2ef8
kernel-modules-extra-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: d28b501b846a6c9e5bc007f1a52615ffd56193b8eb46162b77f92de7f365229e
kernel-tools-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 0f6cb3cf586e28b91d9ba08a019b55a09818ebc37af27f0e397d9260fee7cb2f
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18
kernel-tools-libs-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: bbc0bad30fc65ebc81cb353dc54f6f2a19eecb9dd2fd76138a720e86411511c1
perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 73f122a191ca2f450702499bf2815172ad6ad8eff8f6b316f57a51552b74845f
perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0
python3-perf-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: e909aa48d414b59a2681e6170cf8ee614e86292c33867d238b4a2c178333d541
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
bpftool-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 09366f5aaf7d11ba6f1f65d51a0f0bf53021e14119eb874aec6382a37fc7be50
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: eba6c82e5adb7e3747d9bff3defbe47d2de8e284565930097f3f191e697a5ab0
kernel-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 577b8d4e6c335235df94f383eea906085ebeac940613c190a84f3093ff958c0f
kernel-debuginfo-common-x86_64-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 39cd4b6699ae2abc1d8948cd2ae18d5972cb76f9693560829efe4d617e34a699
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 8876d87511283a4650ac4a7917333ad5d9f16ed90d4bbf0c9d3e3a422bfc6f18
kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 1acc0c946fcf6d838cc0f9d34d6305f1fa138b94d077697927cffb151cc358fe
perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: a9ea7630704fc32683e6cdcb309aaaa12b37bfb6227658d0e5fc2d5e394bb7b0
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.x86_64.rpm
SHA-256: 7591b33d95ede8fc7d67581b685465f0f536b61d529a5d39a46eb7a429cb877e
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
bpftool-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 11b7f60b2f902a5e7434a213adf9af5f84917c17147bf8236b4181dba27f3ddb
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 1d163a306c7db647344344039102b62cb521e5ae37959ba858b51483e3a4b755
kernel-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: b0286df219bc1da238af351e624c1583705b1915cc1a8a2d3027c17779a9529b
kernel-debuginfo-common-ppc64le-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e22f32a05c41a79c29ac041d73446e2e4c26cb818b5561689cb3dd3b84ba0896
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 812f6cd9cb15f80c7fce4ebb48c88b1c4af94aac8a7b6e6f18ca5c2c63ffbd5a
kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: e05c6e713a863594c32c4977acdec40fe0abeaa9e0f969002337436bc823148b
perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: 4fa41564e78f471565b4969b299ab3fbcae7e1d772e5c1bec9618dac4ee91d82
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.ppc64le.rpm
SHA-256: dfeb4b7d454d4826d247b727d021d1018e18a5d15d59932144a446fbfb16cba4
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
bpftool-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: e75e2156b71680926f450a5b04e4d8242d86a522cbf8d59b2362913954ab7d55
kernel-debug-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 965dba89cf309d41e18fb091322fed7afa65816a1af54b3f2fd7c2c8c7bb855c
kernel-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 77f8cac6d31074051f25077229cf2f9ce9ce830756e5c02b3ceb0c958d6944b1
kernel-debuginfo-common-aarch64-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 8e8ccf24d8e12858b6dd3fcc2eaa9c92d2d6dcbbfc250c8ec2c49921682c6d37
kernel-tools-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 821826625662ff889e854a6087602e9fd505c367da06afb6287a28713676dd25
kernel-tools-libs-devel-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 3e84001338f7d4de26e6a4c2184e244312f50f32917ec474bf6c73358bf6aec6
perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 54081b60b1e33beb750ad2124bc9cd96b3a3b6e7be1e965059fcd8b89eb31281
python3-perf-debuginfo-4.18.0-305.57.1.el8_4.aarch64.rpm
SHA-256: 804f6caef77141d37048e055f0ce5baf0acce273bc2e11fc1581d9c8cf057505
Related news
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
Ubuntu Security Notice 6014-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 6001-1 - Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu discovered that the TCP implementation in the Linux kernel did not properly handle IPID assignment. A remote attacker could use this to cause a denial of service or inject forged data. Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Ubuntu Security Notice 5669-1 - It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5650-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5639-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Ubuntu Security Notice 5622-1 - It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information.
Red Hat Security Advisory 2022-6551-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include denial of service, information leakage, privilege escalation, and use-after...
An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-2132: dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs * CVE-2022-...
Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6432-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
Red Hat Security Advisory 2022-6370-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix security issues and several bugs. Issues addressed include a denial of service vulnerability.
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Red Hat Advanced Cluster Management for Kubernetes 2.3.12 General Availability release images, which provide security updates and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-31129: moment: inefficient parsing algorithm resulting in DoS
Red Hat OpenShift Container Platform release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.
Red Hat OpenShift Container Platform release 4.7.56 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
An update is now available for RHOL-5.5-RHEL-8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to MITM attacks * CVE-2022-21698: prometheus/client_golang: Denial of service using InstrumentHandlerCounter * CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.
Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
Red Hat Security Advisory 2022-5806-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5730-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25.
Red Hat Security Advisory 2022-5805-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...
Ubuntu Security Notice 5541-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-5641-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5626-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5636-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include information leakage, privilege escalation, and use-after-free vulnerabilities.
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2021-4197: kernel: cgroup: Use open-time creds and namespace for migration perm checks * CVE-2021-4203: kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses * CVE-202...
An update is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-32250: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
Ubuntu Security Notice 5515-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5513-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Ubuntu Security Notice 5505-1 - Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Likang Luo discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Ubuntu Security Notice 5500-1 - Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. Lin Ma discovered that the NFC Controller Interface implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-5483-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5249-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak
The Migration Toolkit for Containers (MTC) 1.7.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-0536: follow-redirects: Exposure of Sensitive Information via Authorization Header leak
Red Hat Security Advisory 2022-5232-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5392-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which resolve security issues and fix several bugs. Issues addressed include a traversal vulnerability.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5220-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, information leakage, memory leak, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5214-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5224-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5267-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, information leakage, privilege escalation, and use-after-free vulnerabilities.
Red Hat Security Advisory 2022-5201-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which apply security fixes and fix several bugs. Issues addressed include a traversal vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to priv...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer ov...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-29368: kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1729: kernel: race condition in perf_event_open leads to p...
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1012: kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak * CVE-2022-1966: kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root * CVE-2022-27666: kernel: buffer overflow in IPsec ESP transformation code
Red Hat Security Advisory 2022-5157-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a privilege escalation vulnerability.
An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0492: kernel: cgroups v1 release_agent feature may allow privilege escalation * CVE-2022-1729: kernel: race condition in perf_event_open leads to privilege escalation
Red Hat Security Advisory 2022-4956-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include privilege escalation and traversal vulnerabilities.
Red Hat Security Advisory 2022-4956-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include privilege escalation and traversal vulnerabilities.
Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2021-43816: containerd: Unprivileged pod may bind mount any privileged regular file on disk * CVE-2021-43858: minio: user priv...
Red Hat Advanced Cluster Management for Kubernetes 2.5.0 is now generally available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2021-43816: containerd: Unprivileged pod may bind mount any privileged regular file on disk * CVE-2021-43858: minio: user priv...
Ubuntu Security Notice 5471-1 - It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or execute arbitrary code.
net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
The Migration Toolkit for Containers (MTC) 1.6.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2021-39293: golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
The Migration Toolkit for Containers (MTC) 1.6.5 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3807: nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes * CVE-2021-39293: golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550
An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontroll...
An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-14615: kernel: Intel graphics card information leak. * CVE-2020-0427: kernel: out-of-bounds reads in pinctrl subsystem. * CVE-2020-24502: kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24503: kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers * CVE-2020-24504: kernel: Uncontr...