Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2019:3517 - Security Advisory
Issued:
2019-11-05
Updated:
2019-11-05

RHSA-2019:3517 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
  • Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)
  • Kernel: page cache side channel attacks (CVE-2019-5489)
  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)
  • kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)
  • Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)
  • kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)
  • kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)
  • kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)
  • kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)
  • kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)
  • kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)
  • kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)
  • kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)
  • kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)
  • kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)
  • kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)
  • kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)
  • kernel: Linux stack ASLR implementation Integer overflow (CVE-2015-1593)
  • kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)
  • Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)
  • Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64

Fixes

  • BZ - 1192519 - CVE-2015-1593 kernel: Linux stack ASLR implementation Integer overflow
  • BZ - 1656432 - [cgroup bpf devices] BPF program is not properly freed
  • BZ - 1656986 - CVE-2018-19854 kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c
  • BZ - 1660375 - CVE-2018-16884 kernel: nfs: use-after-free in svc_process_common()
  • BZ - 1660385 - CVE-2018-20169 kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS
  • BZ - 1663176 - CVE-2019-3459 kernel: Heap address information leak while using L2CAP_GET_CONF_OPT
  • BZ - 1663179 - CVE-2019-3460 kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
  • BZ - 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks
  • BZ - 1666106 - CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
  • BZ - 1671930 - CVE-2019-7222 Kernel: KVM: leak of uninitialized stack contents to guest
  • BZ - 1686373 - CVE-2019-3874 kernel: SCTP socket buffer memory leak leading to denial of service
  • BZ - 1689426 - CVE-2019-3882 kernel: denial of service vector through vfio DMA mappings
  • BZ - 1694143 - Misc updates to PCI subsystem from v4.20
  • BZ - 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS
  • BZ - 1705937 - CVE-2019-11599 kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
  • BZ - 1709837 - CVE-2019-11884 kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command
  • BZ - 1712072 - CVE-2019-11833 kernel: fs/ext4/extents.c leads to information disclosure
  • BZ - 1712197 - crash in is_size_safe_to_change as the result of race condition in management of cifsInodeInfo->openFileList
  • BZ - 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c
  • BZ - 1719067 - BUG: EACCES on writing empty value to /proc/self/attr/keycreate
  • BZ - 1721034 - [RHEL8 xfs]: fix reporting supported extra file attributes for statx
  • BZ - 1727756 - CVE-2019-13233 kernel: use-after-free in arch/x86/lib/insn-eval.c
  • BZ - 1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
  • BZ - 1729931 - CVE-2019-10638 Kernel: net: weak IP ID generation leads to remote device tracking
  • BZ - 1733874 - CVE-2019-10207 kernel: null-pointer dereference in hci_uart_set_flow_control
  • BZ - 1746708 - CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer
  • BZ - 1750813 - CVE-2019-15916 kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service

CVEs

  • CVE-2015-1593
  • CVE-2018-16884
  • CVE-2018-19854
  • CVE-2018-19985
  • CVE-2018-20169
  • CVE-2019-3459
  • CVE-2019-3460
  • CVE-2019-3874
  • CVE-2019-3882
  • CVE-2019-3900
  • CVE-2019-5489
  • CVE-2019-7222
  • CVE-2019-9506
  • CVE-2019-10126
  • CVE-2019-10207
  • CVE-2019-10638
  • CVE-2019-11599
  • CVE-2019-11833
  • CVE-2019-11884
  • CVE-2019-12382
  • CVE-2019-13233
  • CVE-2019-13648
  • CVE-2019-14821
  • CVE-2019-15214
  • CVE-2019-15666
  • CVE-2019-15916
  • CVE-2019-15919
  • CVE-2019-15920
  • CVE-2019-15921
  • CVE-2019-15924
  • CVE-2019-15927
  • CVE-2019-16994
  • CVE-2019-20811
  • CVE-2020-10720

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux for x86_64 8

    SRPM
    kernel-4.18.0-147.el8.src.rpm SHA-256: bbb0abdcb6b731acf82b887f4a54335906eb965bad5c7d924259baf3a4bd4cb0
    x86_64
    bpftool-4.18.0-147.el8.x86_64.rpm SHA-256: abc9210d60433af8ec23a0cffb7298cb98dfcf991a84956a743e580be86ebdeb
    bpftool-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 52820de22af24abf5c5171bbadae8baea9526d6f69b0f39f054c7d102384322e
    kernel-4.18.0-147.el8.x86_64.rpm SHA-256: 84ff96f87b0455fe605734d7ce6ec192bb8bb203827eb8d005ea231d1740587b
    kernel-abi-whitelists-4.18.0-147.el8.noarch.rpm SHA-256: fa71d53bbf0ccd57f3d72c0baa8549c5ef74082112e7c313496eb584a12eff31
    kernel-core-4.18.0-147.el8.x86_64.rpm SHA-256: 0bc72d2ff777646152ecd3a1e368638f7c1096c8a014007e5308f74dd2d8e86c
    kernel-cross-headers-4.18.0-147.el8.x86_64.rpm SHA-256: 9e346fc7da13a53f1579369d3f7571e3901b838d958dda59111f57d245c9bed0
    kernel-debug-4.18.0-147.el8.x86_64.rpm SHA-256: 0d381b0cfe8131c426cc20908dae2abab979ae526afe34fe15501c0d31e2f75c
    kernel-debug-core-4.18.0-147.el8.x86_64.rpm SHA-256: a1881e6aeeb8e7a405b56646d055fb5498115355111209ef9d704a622a32dc56
    kernel-debug-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: d2c8c047164f6b12e52d5654df76f3505036a9d1a98951110aeeaea2adb740e3
    kernel-debug-devel-4.18.0-147.el8.x86_64.rpm SHA-256: 89987aee8f7c43f003d7d35fe4559b161049695ed1136d00d11acfe6cfd87a5d
    kernel-debug-modules-4.18.0-147.el8.x86_64.rpm SHA-256: 75e958e85e115ba360a1e3b6c0d3852fbdb006ea712eed2e06436631a099c1fd
    kernel-debug-modules-extra-4.18.0-147.el8.x86_64.rpm SHA-256: 6a519b384c5e7f47db18a4147666440c9fba2182e46d58fcc2287b9f2e416a2b
    kernel-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: ff5ec221dade4c6b649f83bbfebf99fc5445d5c34191c36d12f3fe09c1d04837
    kernel-debuginfo-common-x86_64-4.18.0-147.el8.x86_64.rpm SHA-256: 39df5a6cd0777662ee0301bf871a992842e1b353fabaa838273dd2398c0e86cb
    kernel-devel-4.18.0-147.el8.x86_64.rpm SHA-256: c230a7e3a336b3c0c3fba7594824c23776359d7b65539decdeb4e988bfc35940
    kernel-doc-4.18.0-147.el8.noarch.rpm SHA-256: 9ae329843df68c96836328853f7591ae4e1e7e9ac4dcda9195e1bb76a5a7704d
    kernel-headers-4.18.0-147.el8.x86_64.rpm SHA-256: 9c89dad02ba6b856d4ffee764d12167e42b170871ffdf6a60b832fb70d870072
    kernel-modules-4.18.0-147.el8.x86_64.rpm SHA-256: 388edc53fd59b93ffdc630fec373379f9e0f2d4d2c0c1d9c30ea110d865f8e0c
    kernel-modules-extra-4.18.0-147.el8.x86_64.rpm SHA-256: 23b6a8e53224fab414cea6efce6f7662efd28636d5ef49bcb9a1e5f3131cb75e
    kernel-tools-4.18.0-147.el8.x86_64.rpm SHA-256: 210b6c0848c68c9fb2d76009145d94703cf1938e47097def7eb341056db0ebbd
    kernel-tools-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 319d897f051ebdd75f3ddcd5096b318a955d53bb705020705e8cdc608f7d41dc
    kernel-tools-libs-4.18.0-147.el8.x86_64.rpm SHA-256: cb9b07919c2b8dd7608b089c50b8d5ef5f113500612bea7018addad00d47a428
    perf-4.18.0-147.el8.x86_64.rpm SHA-256: 641128e9c63bd1b429918f09a344f800861207859aa8f9db1c59206ff03505d9
    perf-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: c8ad2d9674267359fc22c01f1e73ab1611bccf0c47bebbaac336a16695cb166e
    python3-perf-4.18.0-147.el8.x86_64.rpm SHA-256: 5269e6da10316cde62c686ea35dc57adeab1ee8bbe480d31338628e191de3320
    python3-perf-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 28a89a7494ecc16821389b447bddfaf20dc9c43d5ff8fc9b52e34a4de3ac5bff

    Red Hat Enterprise Linux for IBM z Systems 8

    SRPM
    kernel-4.18.0-147.el8.src.rpm SHA-256: bbb0abdcb6b731acf82b887f4a54335906eb965bad5c7d924259baf3a4bd4cb0
    s390x
    bpftool-4.18.0-147.el8.s390x.rpm SHA-256: 567a65cdd3b7068ee934471d3e4b2cf216f199c39e103a8f38974b47ed840327
    bpftool-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: 6fcf1683a2fbf330d99ee1a64372faee87ed54be039f47895f1ab9a4c1face5c
    kernel-4.18.0-147.el8.s390x.rpm SHA-256: 75562d30136693902ca043079220277ec1003189c8a4d8192506a0b4c0c646ac
    kernel-abi-whitelists-4.18.0-147.el8.noarch.rpm SHA-256: fa71d53bbf0ccd57f3d72c0baa8549c5ef74082112e7c313496eb584a12eff31
    kernel-core-4.18.0-147.el8.s390x.rpm SHA-256: f1d6be8d31b7d44e7a86f519a10c515c75a5e9d9a56e422efef539f6ac189284
    kernel-cross-headers-4.18.0-147.el8.s390x.rpm SHA-256: e0486ac5217d728480881babab83b8b0fe799aaeb475952cbf73c058f7871bc9
    kernel-debug-4.18.0-147.el8.s390x.rpm SHA-256: cdb17abd9c47e6f005b6fedc60d381aa50b708a15a7cd63af4a868ebc54b2345
    kernel-debug-core-4.18.0-147.el8.s390x.rpm SHA-256: b6c26d484aa0e406b6140de84d52fab7be169f6a18b55d4afb5782728aa16761
    kernel-debug-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: daea1f699d1057f1d903a52d3cea7fc9f59acd10f0fa94cbe08dd4421f79fe7e
    kernel-debug-devel-4.18.0-147.el8.s390x.rpm SHA-256: 6c60629c8fc1a099a650d9f6bc2f0558c71ef51b255dd4e53c47a27161195116
    kernel-debug-modules-4.18.0-147.el8.s390x.rpm SHA-256: a898b5c5708225fa929b98990dc61e687b35f45b88822b2c1903c44cdffd8fdb
    kernel-debug-modules-extra-4.18.0-147.el8.s390x.rpm SHA-256: 70938c74976b9c88c2c929abab3f0a6a081a7a5660b428d1e3fca9eb23ce208d
    kernel-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: a60ab1f418cf26fc8351b65ac064dd1482d77b72708b9ea4306346185af44344
    kernel-debuginfo-common-s390x-4.18.0-147.el8.s390x.rpm SHA-256: 7930d14d26f61d48710add497235fda611e6b9100f5c3031ccf033d70fba5b4d
    kernel-devel-4.18.0-147.el8.s390x.rpm SHA-256: c25874d8c1107c5f5aba159a1bb2cf10c6b6bf79793992d9da2bc476584c450b
    kernel-doc-4.18.0-147.el8.noarch.rpm SHA-256: 9ae329843df68c96836328853f7591ae4e1e7e9ac4dcda9195e1bb76a5a7704d
    kernel-headers-4.18.0-147.el8.s390x.rpm SHA-256: 4fc877776641c84cab3fcbddbdceab4eb838ec5d7ed7372205e1d66d9156e718
    kernel-modules-4.18.0-147.el8.s390x.rpm SHA-256: 2b44df89e4cda0db5d270f0cdd150396e6052f3ad8ce53d7480339a5b8e9b4fe
    kernel-modules-extra-4.18.0-147.el8.s390x.rpm SHA-256: 2bae006f0095bc45f6c6c114b9352c8c9971fd2dc299139e2afbca77725ab388
    kernel-tools-4.18.0-147.el8.s390x.rpm SHA-256: 5147749a87f7b48d6ed9b1282a6fe47bb3b1ca6ab976ca58242fdd39bc0f2616
    kernel-tools-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: def71366e1f4deb1d54059e0bf257344388d5c10dab78919f40e575c4f6d205a
    kernel-zfcpdump-4.18.0-147.el8.s390x.rpm SHA-256: 889f6b6460cd8ef0afee31c2c736e00bb664b2c587fbbd5b457200c8de59794c
    kernel-zfcpdump-core-4.18.0-147.el8.s390x.rpm SHA-256: 31068c3b65e098b625782cc9cf664a2d26effbb08b958e6e7ef61dba15b6649d
    kernel-zfcpdump-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: 92c6439e3f1fe2c28a33ca604b1753a20d4fa4695eacc6b7e61223d78e1e5577
    kernel-zfcpdump-devel-4.18.0-147.el8.s390x.rpm SHA-256: 951d92f70279fc40b30f1824d74d9f3d37c7e80904449e1089b7ecd01e719913
    kernel-zfcpdump-modules-4.18.0-147.el8.s390x.rpm SHA-256: a192842fe96ea5cd1520c81bbe5c81a18c418a7c023a0e192d7fbe3a9d7c7b70
    kernel-zfcpdump-modules-extra-4.18.0-147.el8.s390x.rpm SHA-256: 4530f7a1d3606df13e51109976310c564eb4f1a9e24e4a92948b50c93bf41783
    perf-4.18.0-147.el8.s390x.rpm SHA-256: 8f5f99dcfc8a1ffb6e9a094226dd1ab20e8052f370240a6f6859a10a5989fb4d
    perf-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: d4d1c34ec2a0b6a6a72cc4faefa68ea1c291aaefdb092ad85c0a4840f41f3eb0
    python3-perf-4.18.0-147.el8.s390x.rpm SHA-256: 3d7fed27e9a10fab83744f18bc011f1b9d799230ee408f16be1fcc5206721992
    python3-perf-debuginfo-4.18.0-147.el8.s390x.rpm SHA-256: a5673e9250703422456a1b5cc4a1ce7894f08c849218907114cb2d98ef2117e9

    Red Hat Enterprise Linux for Power, little endian 8

    SRPM
    kernel-4.18.0-147.el8.src.rpm SHA-256: bbb0abdcb6b731acf82b887f4a54335906eb965bad5c7d924259baf3a4bd4cb0
    ppc64le
    bpftool-4.18.0-147.el8.ppc64le.rpm SHA-256: 293e05c28bbf8e9de2d2ad28ec458a66d40e4becfc6c0b3bfd70439e27f646da
    bpftool-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: e6d71d380c8283de43e01189efaf2d109a18e39c013bd82dfa60a11c3a5108c0
    kernel-4.18.0-147.el8.ppc64le.rpm SHA-256: a47ff3022b6725ee1a34eb1474ccfa7f5901e19c670acb7660f04c515a191606
    kernel-abi-whitelists-4.18.0-147.el8.noarch.rpm SHA-256: fa71d53bbf0ccd57f3d72c0baa8549c5ef74082112e7c313496eb584a12eff31
    kernel-core-4.18.0-147.el8.ppc64le.rpm SHA-256: 692f44c09fec1524153b5285a4c9bc4e206ccb0933d637ccb9302999af0b0541
    kernel-cross-headers-4.18.0-147.el8.ppc64le.rpm SHA-256: 8f54817ecf5db60eb074dead10e5b9e0fe3f53d2cbf04db0d8e3cf17a2299603
    kernel-debug-4.18.0-147.el8.ppc64le.rpm SHA-256: 1e545eb0a4e8e83a979e5fbcb9e5b8654b2e75ab1cd427f15634cd128f4e3c80
    kernel-debug-core-4.18.0-147.el8.ppc64le.rpm SHA-256: 4e38634a30f9da274fd5f4f29ebdeaa194b212c3348e39cc3519e71e6d1d9105
    kernel-debug-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: 82396738243da6639dbb5f203266d9a624512f2ed2f2e8d65c0b684c22161b0e
    kernel-debug-devel-4.18.0-147.el8.ppc64le.rpm SHA-256: a8792634e9a45cc97d11964ee0b5b8f46942c791a8813e045d485b17ca3fc516
    kernel-debug-modules-4.18.0-147.el8.ppc64le.rpm SHA-256: 47357280fd13706be19c60fff05740a73f35496d87caa5e0392e1343b4f7c588
    kernel-debug-modules-extra-4.18.0-147.el8.ppc64le.rpm SHA-256: 7accf9d1d2bb6a1a7e1ccaed51930eb6e4fdaf0de656da8d1feabd9f1df8c90b
    kernel-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: dac5f946ebf98016ef6156dee9fd88e0afcb9de20f6558a5d12ad2a52fe2379f
    kernel-debuginfo-common-ppc64le-4.18.0-147.el8.ppc64le.rpm SHA-256: e37225fbb65f3f1c769676c83c0c1e30d0438a88d35ac5f5a309818a4fd5824b
    kernel-devel-4.18.0-147.el8.ppc64le.rpm SHA-256: d4eb55520eb13685c52a67bd01c6113431c14b76523405b4049aaf8d52c182f0
    kernel-doc-4.18.0-147.el8.noarch.rpm SHA-256: 9ae329843df68c96836328853f7591ae4e1e7e9ac4dcda9195e1bb76a5a7704d
    kernel-headers-4.18.0-147.el8.ppc64le.rpm SHA-256: 27ef9c906f0c0283faa898bad5a7e5322b6f00815688afc0c9909df0937b41af
    kernel-modules-4.18.0-147.el8.ppc64le.rpm SHA-256: d793e81966cf3df3a514cf0a18495da7215f4ab3c1d539cc93e90e394307a5a1
    kernel-modules-extra-4.18.0-147.el8.ppc64le.rpm SHA-256: a94a832452aff07817e0e7d87958b500fcb9dacb56b931afb20618ada57e08a9
    kernel-tools-4.18.0-147.el8.ppc64le.rpm SHA-256: 13210de0dab7ae7c01207c922a36266cc44f7cca67acf50ab1d95f2b9ca0b571
    kernel-tools-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: be27dadf36c738201bc2841ae96780bb084bc968ff646c44f9f74b5f97004511
    kernel-tools-libs-4.18.0-147.el8.ppc64le.rpm SHA-256: fd79e9034a51b65cd3e28622c218e2a583f4de3e5bdb59327ea1ecb0a5435421
    perf-4.18.0-147.el8.ppc64le.rpm SHA-256: 645f4727aebb59510c2d5fbc88824357617ef9db100ced62680ec5debf7ee941
    perf-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: 9f113f924d9f66eb4442f777df20c4cc3aa4f124036ca78c817d5e3a50399f27
    python3-perf-4.18.0-147.el8.ppc64le.rpm SHA-256: fe1ef6a7adf703f63e1a244e7aa1c5bf57f770706f031822077baffeaa068d35
    python3-perf-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: dff2a9f9d006cb2128e77f3f98061433f0553dfdfb93d80267f51d1f9b3a4ac1

    Red Hat Enterprise Linux for ARM 64 8

    SRPM
    kernel-4.18.0-147.el8.src.rpm SHA-256: bbb0abdcb6b731acf82b887f4a54335906eb965bad5c7d924259baf3a4bd4cb0
    aarch64
    bpftool-4.18.0-147.el8.aarch64.rpm SHA-256: 387dcfb2063efdd6bc20e498d8cc62203854d81d078d1daa58de117def4fe77a
    bpftool-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 08decb6766d751e96b7a4dbf9ab5f16c321ba04a78fa62af5e2105cbd3da0d5d
    kernel-4.18.0-147.el8.aarch64.rpm SHA-256: 0e78ce9f6fc033c3f294ae31db8ed1acbd2b13b6d100c37b731886361c2358d2
    kernel-abi-whitelists-4.18.0-147.el8.noarch.rpm SHA-256: fa71d53bbf0ccd57f3d72c0baa8549c5ef74082112e7c313496eb584a12eff31
    kernel-core-4.18.0-147.el8.aarch64.rpm SHA-256: f30a914b4e59ce5ac546978aaca52ea21e52597d16af56744d0cfd1bdfc0e645
    kernel-cross-headers-4.18.0-147.el8.aarch64.rpm SHA-256: 20fbb8f4da86809fa14c73fbeb55a807fa53787e51085082f6ec9eb0d008346c
    kernel-debug-4.18.0-147.el8.aarch64.rpm SHA-256: 6538441fb57fa1cbaeac432df3c940e09144d8758c888328c6f3f54f89b5ba83
    kernel-debug-core-4.18.0-147.el8.aarch64.rpm SHA-256: 48c19217fcaf39c4196544c3f712308bc3e7f8012b26bd2106ee93767a76b982
    kernel-debug-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 2b9d84df4259c9d49684d1ab9756ca2342d6ea4b1ab93d5b30cfbc0ada24254c
    kernel-debug-devel-4.18.0-147.el8.aarch64.rpm SHA-256: a4390ed374f661c3604e17628e00faed3aeb18f6cad4c29c77238b43ec79a7e6
    kernel-debug-modules-4.18.0-147.el8.aarch64.rpm SHA-256: 91730845d55fc83fb192aba1c54852b6436afc8ccb501d79c13f7de1be0266ad
    kernel-debug-modules-extra-4.18.0-147.el8.aarch64.rpm SHA-256: 18add8e4d8f66b541634ec9b6e7691de210c867eebeabf6e5a9b04a1c9bdebe5
    kernel-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 29de63d62869abb9cded176c179b46a0f7d66a955921d96e062d58111056fff3
    kernel-debuginfo-common-aarch64-4.18.0-147.el8.aarch64.rpm SHA-256: d92b99c78ba0c94e2fa7bd81d6241b2ceef275a70707686119a9aa17073be8ac
    kernel-devel-4.18.0-147.el8.aarch64.rpm SHA-256: e4547296a8c5938514580f7097ec535a30c7dac06e10bf28ae549a46b007d5cb
    kernel-doc-4.18.0-147.el8.noarch.rpm SHA-256: 9ae329843df68c96836328853f7591ae4e1e7e9ac4dcda9195e1bb76a5a7704d
    kernel-headers-4.18.0-147.el8.aarch64.rpm SHA-256: 43422533146856cb73173809e2f19e3d262c2d8db22ebadc1c609ef0241dac40
    kernel-modules-4.18.0-147.el8.aarch64.rpm SHA-256: 4f385135706cbbb5020e855d4e803bdac077093adcabee96f2587ab0307e98b9
    kernel-modules-extra-4.18.0-147.el8.aarch64.rpm SHA-256: 65d968b764970038cfb4bf5399cf64f6fdd5e70ce1d7f11baca67816750a0e67
    kernel-tools-4.18.0-147.el8.aarch64.rpm SHA-256: 71795cff473c5a0041d5860a0e9e6eccd269a61a4ce67b790e1e427604605279
    kernel-tools-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: c721cf505d1e515b32d5ab780730d84556b5566b5aa6e0ba6dfabf87cc2e63fa
    kernel-tools-libs-4.18.0-147.el8.aarch64.rpm SHA-256: 0474101b68803778bde2eb1b07509c23a322962d6392bcac52488c7f837e1725
    perf-4.18.0-147.el8.aarch64.rpm SHA-256: f0f53efbc00a2826a89ed6cb6ae1e8e90317d769f8a42cdbe684ee8963f6a9fc
    perf-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 084a3daab998601325872f376a3c964046a99878722e663b49273359c19b4e8c
    python3-perf-4.18.0-147.el8.aarch64.rpm SHA-256: f9e181f73f17ed6b82dfecb091e556e2ccb65ef3fb18d9271c8ca4fb9f1044aa
    python3-perf-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 7888a1636c3a763ea77feffebfd9729c01adf0c6a213520b9854f78b9649ae08

    Red Hat CodeReady Linux Builder for x86_64 8

    SRPM
    x86_64
    bpftool-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 52820de22af24abf5c5171bbadae8baea9526d6f69b0f39f054c7d102384322e
    kernel-debug-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: d2c8c047164f6b12e52d5654df76f3505036a9d1a98951110aeeaea2adb740e3
    kernel-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: ff5ec221dade4c6b649f83bbfebf99fc5445d5c34191c36d12f3fe09c1d04837
    kernel-debuginfo-common-x86_64-4.18.0-147.el8.x86_64.rpm SHA-256: 39df5a6cd0777662ee0301bf871a992842e1b353fabaa838273dd2398c0e86cb
    kernel-tools-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 319d897f051ebdd75f3ddcd5096b318a955d53bb705020705e8cdc608f7d41dc
    kernel-tools-libs-devel-4.18.0-147.el8.x86_64.rpm SHA-256: 2540e1c29ca1d30c0d2f80a036a1c2d39975e15efaeaf939e46c7a5384e8d87b
    perf-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: c8ad2d9674267359fc22c01f1e73ab1611bccf0c47bebbaac336a16695cb166e
    python3-perf-debuginfo-4.18.0-147.el8.x86_64.rpm SHA-256: 28a89a7494ecc16821389b447bddfaf20dc9c43d5ff8fc9b52e34a4de3ac5bff

    Red Hat CodeReady Linux Builder for Power, little endian 8

    SRPM
    ppc64le
    bpftool-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: e6d71d380c8283de43e01189efaf2d109a18e39c013bd82dfa60a11c3a5108c0
    kernel-debug-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: 82396738243da6639dbb5f203266d9a624512f2ed2f2e8d65c0b684c22161b0e
    kernel-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: dac5f946ebf98016ef6156dee9fd88e0afcb9de20f6558a5d12ad2a52fe2379f
    kernel-debuginfo-common-ppc64le-4.18.0-147.el8.ppc64le.rpm SHA-256: e37225fbb65f3f1c769676c83c0c1e30d0438a88d35ac5f5a309818a4fd5824b
    kernel-tools-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: be27dadf36c738201bc2841ae96780bb084bc968ff646c44f9f74b5f97004511
    kernel-tools-libs-devel-4.18.0-147.el8.ppc64le.rpm SHA-256: fe7f23abab2ead63d9e7a4013b66bfaf65818f8c47c8b16ffc7cc248f79f4670
    perf-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: 9f113f924d9f66eb4442f777df20c4cc3aa4f124036ca78c817d5e3a50399f27
    python3-perf-debuginfo-4.18.0-147.el8.ppc64le.rpm SHA-256: dff2a9f9d006cb2128e77f3f98061433f0553dfdfb93d80267f51d1f9b3a4ac1

    Red Hat CodeReady Linux Builder for ARM 64 8

    SRPM
    aarch64
    bpftool-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 08decb6766d751e96b7a4dbf9ab5f16c321ba04a78fa62af5e2105cbd3da0d5d
    kernel-debug-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 2b9d84df4259c9d49684d1ab9756ca2342d6ea4b1ab93d5b30cfbc0ada24254c
    kernel-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 29de63d62869abb9cded176c179b46a0f7d66a955921d96e062d58111056fff3
    kernel-debuginfo-common-aarch64-4.18.0-147.el8.aarch64.rpm SHA-256: d92b99c78ba0c94e2fa7bd81d6241b2ceef275a70707686119a9aa17073be8ac
    kernel-tools-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: c721cf505d1e515b32d5ab780730d84556b5566b5aa6e0ba6dfabf87cc2e63fa
    kernel-tools-libs-devel-4.18.0-147.el8.aarch64.rpm SHA-256: 76c2d4daf466c0e215a0fbb99e678363d7f502b41d1b2e7709f59093967e39f8
    perf-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 084a3daab998601325872f376a3c964046a99878722e663b49273359c19b4e8c
    python3-perf-debuginfo-4.18.0-147.el8.aarch64.rpm SHA-256: 7888a1636c3a763ea77feffebfd9729c01adf0c6a213520b9854f78b9649ae08

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook