Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0724 - Security Advisory
Issued:
2024-02-07
Updated:
2024-02-07

RHSA-2024:0724 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)
  • kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)
  • kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646)
  • kernel: use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
  • kernel: improper input validation may lead to privilege escalation (CVE-2021-4204)
  • kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
  • kernel: eBPF verification flaw (CVE-2021-34866)
  • kernel: smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)
  • kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges (CVE-2022-0500)
  • kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
  • kernel: possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)
  • kernel: buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
  • kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
  • kernel: netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)
  • kernel: memory leak in ipv6_renew_options() (CVE-2022-3524)
  • kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545)
  • kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566)
  • kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594)
  • kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619)
  • kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623)
  • kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707)
  • kernel: possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
  • kernel: local privileges escalation in kernel/bpf/verifier.c (CVE-2022-23222)
  • kernel: Executable Space Protection Bypass (CVE-2022-25265)
  • kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388)
  • kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64

Fixes

  • BZ - 1946279 - CVE-2021-30002 kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c
  • BZ - 1980646 - CVE-2021-3640 kernel: use-after-free vulnerability in function sco_sock_sendmsg()
  • BZ - 2000457 - CVE-2021-34866 kernel: eBPF verification flaw
  • BZ - 2037386 - CVE-2022-0168 kernel: smb2_ioctl_query_info NULL pointer dereference
  • BZ - 2039178 - CVE-2021-4204 kernel: improper input validation may lead to privilege escalation
  • BZ - 2043520 - CVE-2022-23222 kernel: local privileges escalation in kernel/bpf/verifier.c
  • BZ - 2044578 - CVE-2022-0500 kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges
  • BZ - 2051444 - CVE-2022-24448 kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR
  • BZ - 2053632 - CVE-2022-0617 kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
  • BZ - 2055499 - CVE-2022-25265 kernel: Executable Space Protection Bypass
  • BZ - 2073064 - CVE-2022-28390 kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
  • BZ - 2073091 - CVE-2022-28388 kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
  • BZ - 2074208 - CVE-2022-28893 kernel: use after free in SUNRPC subsystem
  • BZ - 2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c
  • BZ - 2084183 - CVE-2022-21499 kernel: possible to use the debugger to write zero into a location of choice
  • BZ - 2096178 - CVE-2022-2078 kernel: buffer overflow in nft_set_desc_concat_parse()
  • BZ - 2114878 - CVE-2022-2586 kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation
  • BZ - 2115278 - CVE-2022-36946 kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
  • BZ - 2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue
  • BZ - 2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
  • BZ - 2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed
  • BZ - 2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
  • BZ - 2148520 - CVE-2022-45887 kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c
  • BZ - 2149024 - CVE-2022-3594 kernel: Rate limit overflow messages in r8152 in intr_callback
  • BZ - 2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options()
  • BZ - 2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
  • BZ - 2161310 - CVE-2022-3545 kernel: nfp: use-after-free in area_cache_get()
  • BZ - 2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
  • BZ - 2168332 - CVE-2023-23455 Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion
  • BZ - 2173434 - CVE-2023-1075 kernel: net/tls: tls_is_tx_ready() checked list_entry
  • BZ - 2176140 - CVE-2023-1252 kernel: ovl: fix use after free in struct ovl_aio_req
  • BZ - 2177389 - CVE-2023-28328 kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c
  • BZ - 2181330 - CVE-2023-28772 kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow
  • BZ - 2185945 - CVE-2023-1989 kernel: Use after free bug in btsdio_remove due to race condition
  • BZ - 2187813 - CVE-2023-2166 kernel: NULL pointer dereference in can_rcv_filter
  • BZ - 2187931 - CVE-2023-2176 kernel: Slab-out-of-bound read in compare_netdev_and_ip
  • BZ - 2193219 - CVE-2023-0458 kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c
  • BZ - 2207625 - CVE-2023-20569 hw amd: Return Address Predictor vulnerability leading to information disclosure
  • BZ - 2213199 - CVE-2023-3141 kernel: Use after free bug in r592_remove
  • BZ - 2215837 - CVE-2023-35825 kernel: r592: race condition leading to use-after-free in r592_remove()
  • BZ - 2221707 - CVE-2023-4132 kernel: smsusb: use-after-free caused by do_submit_urb()
  • BZ - 2231800 - CVE-2023-40283 kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c
  • BZ - 2244715 - CVE-2023-45862 kernel: drivers/usb/storage/ene_ub6250.c
  • BZ - 2245514 - CVE-2023-4921 kernel: use-after-free in sch_qfq network scheduler
  • BZ - 2246944 - CVE-2023-46813 kernel: SEV-ES local priv escalation
  • BZ - 2246945 - CVE-2023-5717 kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list
  • BZ - 2253614 - CVE-2023-6610 kernel: OOB Access in smb2_dump_detail
  • BZ - 2253908 - CVE-2024-0646 kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
  • BZ - 2254052 - CVE-2023-6536 kernel: NULL pointer dereference in __nvmet_req_complete
  • BZ - 2254053 - CVE-2023-6535 kernel: NULL pointer dereference in nvmet_tcp_execute_request
  • BZ - 2254054 - CVE-2023-6356 kernel: NULL pointer dereference in nvmet_tcp_build_iovec
  • BZ - 2255139 - CVE-2023-6817 kernel: inactive elements in nft_pipapo_walk
  • BZ - 2255283 - CVE-2023-6932 kernel: use-after-free in IPv4 IGMP

CVEs

  • CVE-2021-3640
  • CVE-2021-4204
  • CVE-2021-30002
  • CVE-2021-34866
  • CVE-2022-0168
  • CVE-2022-0500
  • CVE-2022-0617
  • CVE-2022-1462
  • CVE-2022-2078
  • CVE-2022-2586
  • CVE-2022-2663
  • CVE-2022-3524
  • CVE-2022-3545
  • CVE-2022-3566
  • CVE-2022-3594
  • CVE-2022-3619
  • CVE-2022-3623
  • CVE-2022-3707
  • CVE-2022-21499
  • CVE-2022-23222
  • CVE-2022-24448
  • CVE-2022-25265
  • CVE-2022-28388
  • CVE-2022-28390
  • CVE-2022-28893
  • CVE-2022-36946
  • CVE-2022-39189
  • CVE-2022-45887
  • CVE-2023-0458
  • CVE-2023-1075
  • CVE-2023-1252
  • CVE-2023-1989
  • CVE-2023-2166
  • CVE-2023-2176
  • CVE-2023-3141
  • CVE-2023-4132
  • CVE-2023-4921
  • CVE-2023-5717
  • CVE-2023-6356
  • CVE-2023-6535
  • CVE-2023-6536
  • CVE-2023-6610
  • CVE-2023-6817
  • CVE-2023-6932
  • CVE-2023-20569
  • CVE-2023-23455
  • CVE-2023-28328
  • CVE-2023-28772
  • CVE-2023-35825
  • CVE-2023-40283
  • CVE-2023-45862
  • CVE-2023-46813
  • CVE-2024-0646

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
x86_64
bpftool-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f10986a1db8ea5495b41b4d61de3682da068dc56ad281edbe46c080bc942077b
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d0bf1f14762f6e3a3a80f504f58a289786e075ed79754731f885f03cbab9fc5e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 74f49c4cb378a63a8da580dd4edb76be756e0d7c579e86e9d8a134f72e7126a4
kernel-cross-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 94ca7f02c2078ca756a49bb7f0d44f0278a4b5fb3d710bd01e2bc16e0f4a4af1
kernel-debug-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 6e2c76fb2d83cee7ddcb5056b32cd7e7b1176d806944930ed3fde17e7d9d2b35
kernel-debug-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 349e08735a21181956307eb0829012590df613bb86961fdb7a1deeb950ea2b35
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debug-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 43f40981be781a63e6b9c16daf89c491f93f432dbef82a8c4bb37d7691edaa69
kernel-debug-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: ded40e177808c7f266c9a430369c41b933dd7daffa285290eaec78c69f9b3778
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4dafe627b248051b3830abc6e6760fe7dd87d115d72af231209add8fcf0faaed
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 126d23792a221530995e4e36fe3009eaa281ee4fe8a0a6e36a55805a24524d13
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0f03f336e545db58616fbdbd55f6c16e1ca36d6a2cf416fa32ac8098fedd1904
kernel-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: a57cff024311b87e0034f6fabe449c294185a0b2aee4627e0489d01e550aee76
kernel-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: e1ae5357cabf28c241a108cb82473393fa5a5032cb8ec9a52d9dbea26d97f811
kernel-tools-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 34c9c9473342801845fe2fe9613c8bded00dd2713ff7db695b4d75c6a9c93046
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
kernel-tools-libs-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f6a243cc27f4774abba5352ee519a1adc21460d407091b0e5be9ce7a97c5ecad
perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0a309983b97ea7bde47488db505b1cd601072575e552cebae6df2c6b65175021
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: be9f29fdcb0061e6debe8154bced8bfb47028a83c930fcde96cabcf32177eb7e
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat Enterprise Linux Server - AUS 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
x86_64
bpftool-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f10986a1db8ea5495b41b4d61de3682da068dc56ad281edbe46c080bc942077b
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d0bf1f14762f6e3a3a80f504f58a289786e075ed79754731f885f03cbab9fc5e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 74f49c4cb378a63a8da580dd4edb76be756e0d7c579e86e9d8a134f72e7126a4
kernel-cross-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 94ca7f02c2078ca756a49bb7f0d44f0278a4b5fb3d710bd01e2bc16e0f4a4af1
kernel-debug-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 6e2c76fb2d83cee7ddcb5056b32cd7e7b1176d806944930ed3fde17e7d9d2b35
kernel-debug-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 349e08735a21181956307eb0829012590df613bb86961fdb7a1deeb950ea2b35
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debug-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 43f40981be781a63e6b9c16daf89c491f93f432dbef82a8c4bb37d7691edaa69
kernel-debug-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: ded40e177808c7f266c9a430369c41b933dd7daffa285290eaec78c69f9b3778
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4dafe627b248051b3830abc6e6760fe7dd87d115d72af231209add8fcf0faaed
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 126d23792a221530995e4e36fe3009eaa281ee4fe8a0a6e36a55805a24524d13
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0f03f336e545db58616fbdbd55f6c16e1ca36d6a2cf416fa32ac8098fedd1904
kernel-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: a57cff024311b87e0034f6fabe449c294185a0b2aee4627e0489d01e550aee76
kernel-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: e1ae5357cabf28c241a108cb82473393fa5a5032cb8ec9a52d9dbea26d97f811
kernel-tools-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 34c9c9473342801845fe2fe9613c8bded00dd2713ff7db695b4d75c6a9c93046
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
kernel-tools-libs-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f6a243cc27f4774abba5352ee519a1adc21460d407091b0e5be9ce7a97c5ecad
perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0a309983b97ea7bde47488db505b1cd601072575e552cebae6df2c6b65175021
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: be9f29fdcb0061e6debe8154bced8bfb47028a83c930fcde96cabcf32177eb7e
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
s390x
bpftool-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: e74d0d051022f5f4366629c7555c6cd306e43233f0469e451ed01f373bfc1a0f
bpftool-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: e50ae26c72a5ae62cc1e7bbf8f8c468fd3dd72c124ecb24224ca63c67a3cafb7
kernel-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: f3550eefd7c7787af54636c26f039a72443a7e75cb5ccf53e8d88c62c0967ddf
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 9b1378fe8430c976920a7b153e391b8d390764ec8419416a60a7adb0afa16e48
kernel-cross-headers-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 8d2728158e3fe3b1c56bfdf37d1522fcb5817592152d93a6f7dc769c7e77787b
kernel-debug-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: aa575e54057f5e655a1ed81258de2c9653ed88f923f9673ffccc1911cbd3859b
kernel-debug-core-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 08beebf507b54acce5b164adaf4ada8b5d0453332bf5cd4bfe6e062dca4baa8d
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 8a2b71355ada6d23066f1b098232b0de63cd40c37c669995962f8e17c3afed87
kernel-debug-devel-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 3ba4049197a80fb29d157878d88d57389ff29373aa8bc55e36b1ae356278f9c5
kernel-debug-modules-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: d6957b75c6e001159fed2417a8d36ca6a233a4e0d91625a40bb61310d2f30947
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: e5f7dcd62aae80f545108e89ea22ae54921fdbea219055e360e54a2d19a6c5b6
kernel-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 8c6185f528d23f120447d6b049070c336e53edd78287f21374d8e596455643d0
kernel-debuginfo-common-s390x-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: a0b3f8e5993dda2ff2258002c3504cb6d94b7087142c2c19ff601795e8fa6037
kernel-devel-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 552913c6def079f52e4d68c0a9f5d4fe4fa3fb9a214cf011e6e0dc858008a09f
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 8cc739e1d3c5a9e4d77aab6beabcb6eb4457aa5b5fe9edf9349c4be47a1e616e
kernel-modules-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 1975e97a641fce2926c73d84474bf3e0c53fc83f1ff73b36c9c537ba2f209c97
kernel-modules-extra-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 53dba5147f031a99069c6e7daf017247262cc576c99c8af774841c29fdd0c998
kernel-tools-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 335ceaac88076770e4821459e1fb410fdf81ce0b375b32549f874076c2dffd30
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 3ed6c3f63d354506e1075eb06447590285f84a9d385321ee6b545dc2658e2be3
kernel-zfcpdump-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 6dd456e18d363380ca81c48151262baab43fd59fa18028ca4b1f1ac535ac5911
kernel-zfcpdump-core-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: f262bb1d7138af329a64dba4e45bde6de0f4e9e6b2a04bb9a6eb2925dac53774
kernel-zfcpdump-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 724c20c4d54f80067c750e4b55766172198dd61918deaada684b9452e5f5cda4
kernel-zfcpdump-devel-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: cdd90b1b6fb16744482fd74554b32058a2d6012b4d02415b060c149498868de8
kernel-zfcpdump-modules-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 6bffbcf21e165bbcf3fcc7d75dd48d2ddbbea01a889ec2e7cf5bed87446295cd
kernel-zfcpdump-modules-extra-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 162969f75803f6fa4fd26afd09a7a3dc0dc17b12bea9bbe5d4734354f14e5522
perf-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 03a023d154376f424b1e22ebb6709b44b79534c712c9dfb535cc2025bf03fd00
perf-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 0fb1c8701146f07a5882619bd64c7e642ef4311cbdf0468f162f7f8af8879c35
python3-perf-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: 9acdd7851215e67223c58ec8b30ac21afe420dcbbbc942188384bef682f4e337
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.s390x.rpm SHA-256: c5c859891bf716479c46fee747e10e3ed9c835cf80558b76daf3636a6356f914

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
ppc64le
bpftool-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 637981c9b7a2224f30e622fceac474618b4b460e03fd24ab163ed9d777f2a916
bpftool-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 2309b36eb231152c460f2ec0f0400fde7b3d5179ded6dde39e145d4770760fcc
kernel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 9b2de3bbba71ea490b436a9ace96b6486d7c37967e2b83c4c8f224778d9f7f1e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 02e988151262575b50ff6a750b437e7b5b3f53c2074b454a7f08577fd1663d3c
kernel-cross-headers-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 7fbd70a0a0e4adbb3f2e79996a8281ef414c8169ef20fdf0f94fba8e484a41d8
kernel-debug-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 140eeaa31723f312697b2b3013e093274ff769749b7f5a3f0029c1e85fc79fe0
kernel-debug-core-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ac49ec8694fc7897e3d50c5fa37d2b35dfbbee7cb00f2ef72563c755fad38805
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ab3ce493d0e5672956e51c55771e83f463220ed02e4999e1e49a5040df0d366d
kernel-debug-devel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 66ca6243eb1a78b877d8f72e8e99933f6718bdfc033bcb709d6e7c7324331bc9
kernel-debug-modules-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: d320e60c41eb1bc5ab18fdf7c8bf04d318d5f1438966e305ace7b7c0b3fb85d3
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: a41a11318aad7a744cd2b8fcf0e36a0ce2d65c5a6a434a36159940d7182d416f
kernel-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 44ecaad1897ebf818bec3c93a2ace92211b34ce1808ec572955eb2ac60a8a19c
kernel-debuginfo-common-ppc64le-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 69bff28b55f025581c80c1befcfd8ec2e510fa5eef0778a0b914addb760cafaa
kernel-devel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 940f7798b79e8fd3f18995f444ce2eecc84767cc188ebbbcb1f6ced59a2d518d
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: bbabecf5b06c316cfc8d468fd4f3d46dfbce65dcda37c5deed154093e2f3c850
kernel-modules-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ab441d64d672bb54d4de918ad1ec37dad6d63c4c5ace93c924a90b94786749c3
kernel-modules-extra-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 0f743e272c577b6bffc2e7dedf2cfc65eb8100d70595b02d925a2c170a6568a4
kernel-tools-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: c04dfd14362ecfc63e85ccef539d4b17efba29cae9df57141899a2f4204eb7d6
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 776ac06c544204701949d3dc439800c8bca9a2ca8a577ee7a2ebc01e2d08b47f
kernel-tools-libs-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: cce13640b1829cf3d1e1848a8835efd8e609b9c440801d47ad1f5a0507147146
perf-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ebb2224850766659e68e08deee9cdbf548e9540139378bb3687c3929090b3249
perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 5ab6057857dd56c4b895f3c2628bf88c0aa927a035d503a6968da4e0a5b1bc14
python3-perf-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 528c7ecc5618a66c6f3b0151e6eda0ca61716cd267c72cd1b81f53e438b1e883
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 1b08799aca22a7fe7398d1f801964352aa617834db98c5152ea940f3132dde03

Red Hat Virtualization Host 4 for RHEL 8

SRPM
x86_64
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 126d23792a221530995e4e36fe3009eaa281ee4fe8a0a6e36a55805a24524d13
kernel-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0f03f336e545db58616fbdbd55f6c16e1ca36d6a2cf416fa32ac8098fedd1904
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0a309983b97ea7bde47488db505b1cd601072575e552cebae6df2c6b65175021
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat Enterprise Linux Server - TUS 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
x86_64
bpftool-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f10986a1db8ea5495b41b4d61de3682da068dc56ad281edbe46c080bc942077b
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d0bf1f14762f6e3a3a80f504f58a289786e075ed79754731f885f03cbab9fc5e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 74f49c4cb378a63a8da580dd4edb76be756e0d7c579e86e9d8a134f72e7126a4
kernel-cross-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 94ca7f02c2078ca756a49bb7f0d44f0278a4b5fb3d710bd01e2bc16e0f4a4af1
kernel-debug-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 6e2c76fb2d83cee7ddcb5056b32cd7e7b1176d806944930ed3fde17e7d9d2b35
kernel-debug-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 349e08735a21181956307eb0829012590df613bb86961fdb7a1deeb950ea2b35
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debug-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 43f40981be781a63e6b9c16daf89c491f93f432dbef82a8c4bb37d7691edaa69
kernel-debug-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: ded40e177808c7f266c9a430369c41b933dd7daffa285290eaec78c69f9b3778
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4dafe627b248051b3830abc6e6760fe7dd87d115d72af231209add8fcf0faaed
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 126d23792a221530995e4e36fe3009eaa281ee4fe8a0a6e36a55805a24524d13
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0f03f336e545db58616fbdbd55f6c16e1ca36d6a2cf416fa32ac8098fedd1904
kernel-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: a57cff024311b87e0034f6fabe449c294185a0b2aee4627e0489d01e550aee76
kernel-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: e1ae5357cabf28c241a108cb82473393fa5a5032cb8ec9a52d9dbea26d97f811
kernel-tools-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 34c9c9473342801845fe2fe9613c8bded00dd2713ff7db695b4d75c6a9c93046
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
kernel-tools-libs-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f6a243cc27f4774abba5352ee519a1adc21460d407091b0e5be9ce7a97c5ecad
perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0a309983b97ea7bde47488db505b1cd601072575e552cebae6df2c6b65175021
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: be9f29fdcb0061e6debe8154bced8bfb47028a83c930fcde96cabcf32177eb7e
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
aarch64
bpftool-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 6d36795ca3c8e28f214f42d8c9f298b63aa834360e4f454f4923098998b7830f
bpftool-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 384fa841602cc1c377c6ef2003ada4753eb3753249bab887f34b98747ba41a6a
kernel-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: a89263b28d23710362954b7789373277e5e030900c8b858acbe46ee6e3a50a46
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: c51df700cb901aa6be3acce11fca8ee2a304739efe965d149133af11bb4263ba
kernel-cross-headers-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 652c9e3e82e72bd4c9ea82b845ecb6ec0aa1febb13da59b17420ed8aef1c3d11
kernel-debug-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 7d16cb0ce391915fa0ceea0321fba5b4665d5b6bfdff32cd81a252be38b4bab2
kernel-debug-core-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 550e1dc7783e94759983fc0cf32306d228424af1c68661b4edb8f545a5e87118
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: abf53002a237cf4ccd65ac3ac5e8aea9415ce6df596e75464481e44c4034111f
kernel-debug-devel-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 296285c604a5edea7b8ef3b6b87a1e2b9b42a8a9daad482e45bbdf24c3df0cd5
kernel-debug-modules-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 4d3e50524595d72fcd0ad5201861f645f6682147e3647e4fd65aa5375846cfba
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 42d71beb86465f7bfbb1cfa97bd27d9012a543e18c20c856673ac72b8b982990
kernel-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 73e7ea87035f844c69f1bd297b2787412a7acbdbc85daf116cb84262610ac31a
kernel-debuginfo-common-aarch64-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 39c4744ce1e031dbe1ccb43c0baea972cd7db465228c2756cc517a96dc4702c5
kernel-devel-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: fd1e84874e86a852ecd4af12172ad9bad6c8bedb6aa389b59b47c77f01163575
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: b025b34cc06a41ab513119f55143888c5c1e404d4c68b746ae02fa3478abe5b6
kernel-modules-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 9414cdc46834746029e61d0e203a3925e61ac3aadb834fc18dc730fb925cf1a4
kernel-modules-extra-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: f04ec1965f46260a7896669d833aa513fea6a22247fcc1053dbce9e295ddb185
kernel-tools-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 3584cfa4863e15a872cf32ae412feb828362a5866bd4f7229cb8441dafda3f0c
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 43447b3f85ed914ba4482444f389589ee2286f003ecf5ea981eeb962a52f6e07
kernel-tools-libs-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 5f827ef8286ab89997f79dbd5711fe28cfed5d2ac029d2aaec32b0a7d09efba4
perf-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 5c5b481445f2664d7b3d7ff2b91b131ec68a953a6f44dd1ddb067ef6c44a45b6
perf-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: a01dd697d660f91ec037f03c77171f608491d2b41dfb6abc88adb9a826fcbc42
python3-perf-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 27b87d81db804319430a0230ddbbd396088dc481c425560eb07817d93295046d
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 65364714c12d2a49d2f632c249ad5eac8493e14c983840f505bee1373562f5c8

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
ppc64le
bpftool-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 637981c9b7a2224f30e622fceac474618b4b460e03fd24ab163ed9d777f2a916
bpftool-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 2309b36eb231152c460f2ec0f0400fde7b3d5179ded6dde39e145d4770760fcc
kernel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 9b2de3bbba71ea490b436a9ace96b6486d7c37967e2b83c4c8f224778d9f7f1e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 02e988151262575b50ff6a750b437e7b5b3f53c2074b454a7f08577fd1663d3c
kernel-cross-headers-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 7fbd70a0a0e4adbb3f2e79996a8281ef414c8169ef20fdf0f94fba8e484a41d8
kernel-debug-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 140eeaa31723f312697b2b3013e093274ff769749b7f5a3f0029c1e85fc79fe0
kernel-debug-core-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ac49ec8694fc7897e3d50c5fa37d2b35dfbbee7cb00f2ef72563c755fad38805
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ab3ce493d0e5672956e51c55771e83f463220ed02e4999e1e49a5040df0d366d
kernel-debug-devel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 66ca6243eb1a78b877d8f72e8e99933f6718bdfc033bcb709d6e7c7324331bc9
kernel-debug-modules-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: d320e60c41eb1bc5ab18fdf7c8bf04d318d5f1438966e305ace7b7c0b3fb85d3
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: a41a11318aad7a744cd2b8fcf0e36a0ce2d65c5a6a434a36159940d7182d416f
kernel-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 44ecaad1897ebf818bec3c93a2ace92211b34ce1808ec572955eb2ac60a8a19c
kernel-debuginfo-common-ppc64le-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 69bff28b55f025581c80c1befcfd8ec2e510fa5eef0778a0b914addb760cafaa
kernel-devel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 940f7798b79e8fd3f18995f444ce2eecc84767cc188ebbbcb1f6ced59a2d518d
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: bbabecf5b06c316cfc8d468fd4f3d46dfbce65dcda37c5deed154093e2f3c850
kernel-modules-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ab441d64d672bb54d4de918ad1ec37dad6d63c4c5ace93c924a90b94786749c3
kernel-modules-extra-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 0f743e272c577b6bffc2e7dedf2cfc65eb8100d70595b02d925a2c170a6568a4
kernel-tools-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: c04dfd14362ecfc63e85ccef539d4b17efba29cae9df57141899a2f4204eb7d6
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 776ac06c544204701949d3dc439800c8bca9a2ca8a577ee7a2ebc01e2d08b47f
kernel-tools-libs-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: cce13640b1829cf3d1e1848a8835efd8e609b9c440801d47ad1f5a0507147146
perf-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ebb2224850766659e68e08deee9cdbf548e9540139378bb3687c3929090b3249
perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 5ab6057857dd56c4b895f3c2628bf88c0aa927a035d503a6968da4e0a5b1bc14
python3-perf-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 528c7ecc5618a66c6f3b0151e6eda0ca61716cd267c72cd1b81f53e438b1e883
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 1b08799aca22a7fe7398d1f801964352aa617834db98c5152ea940f3132dde03

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM
kernel-4.18.0-372.91.1.el8_6.src.rpm SHA-256: 3d79dc56adb6421385d206b5752c49328206b1ca9bd0c1f0456148fe0ec26aa7
x86_64
bpftool-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f10986a1db8ea5495b41b4d61de3682da068dc56ad281edbe46c080bc942077b
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d0bf1f14762f6e3a3a80f504f58a289786e075ed79754731f885f03cbab9fc5e
kernel-abi-stablelists-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 97f9df4fd8819575538b0b068664476c61a5ba40a6a6597d37a125bd2cb146ab
kernel-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 74f49c4cb378a63a8da580dd4edb76be756e0d7c579e86e9d8a134f72e7126a4
kernel-cross-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 94ca7f02c2078ca756a49bb7f0d44f0278a4b5fb3d710bd01e2bc16e0f4a4af1
kernel-debug-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 6e2c76fb2d83cee7ddcb5056b32cd7e7b1176d806944930ed3fde17e7d9d2b35
kernel-debug-core-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 349e08735a21181956307eb0829012590df613bb86961fdb7a1deeb950ea2b35
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debug-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 43f40981be781a63e6b9c16daf89c491f93f432dbef82a8c4bb37d7691edaa69
kernel-debug-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: ded40e177808c7f266c9a430369c41b933dd7daffa285290eaec78c69f9b3778
kernel-debug-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4dafe627b248051b3830abc6e6760fe7dd87d115d72af231209add8fcf0faaed
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 126d23792a221530995e4e36fe3009eaa281ee4fe8a0a6e36a55805a24524d13
kernel-doc-4.18.0-372.91.1.el8_6.noarch.rpm SHA-256: 3e6b26a86c9ae086e0e7570d11a08544965bb57799178ab095f6ff5576f270aa
kernel-headers-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0f03f336e545db58616fbdbd55f6c16e1ca36d6a2cf416fa32ac8098fedd1904
kernel-modules-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: a57cff024311b87e0034f6fabe449c294185a0b2aee4627e0489d01e550aee76
kernel-modules-extra-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: e1ae5357cabf28c241a108cb82473393fa5a5032cb8ec9a52d9dbea26d97f811
kernel-tools-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 34c9c9473342801845fe2fe9613c8bded00dd2713ff7db695b4d75c6a9c93046
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
kernel-tools-libs-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: f6a243cc27f4774abba5352ee519a1adc21460d407091b0e5be9ce7a97c5ecad
perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 0a309983b97ea7bde47488db505b1cd601072575e552cebae6df2c6b65175021
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: be9f29fdcb0061e6debe8154bced8bfb47028a83c930fcde96cabcf32177eb7e
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6

SRPM
x86_64
bpftool-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 2fb2a01831a25109c92f95425708410bf7636a331fc237436e629b6b34461326
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 15e5f41a12be505f91f3174a7af64499a78141525bf2810ca0259327ef2d045c
kernel-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d48cdee321a5e61f35e0881abe6d739bab325a49df252103dad4dd044cb1669d
kernel-debuginfo-common-x86_64-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 02c64406afe3d2af89dc55739eff4ed385e2b958ff976b07b5de0cb1c8bd9866
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: aec787265e11faab13f4fa7165a86e26f9583c190d6859e0fc4d28c01ca11cad
kernel-tools-libs-devel-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 834d34805abb2040609cb86038ca89ba85e5da864eebb4cb809aabe88863fe9e
perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: 4a8eb49fc2b545dd716a8bf88feacf488f63415ac4a7cb1e144cb3e3ca3146fd
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.x86_64.rpm SHA-256: d29180747b89ab4edfc45b74dd78644afe28db6e9ec2ee4342c036dc6fb76c11

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6

SRPM
ppc64le
bpftool-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 2309b36eb231152c460f2ec0f0400fde7b3d5179ded6dde39e145d4770760fcc
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: ab3ce493d0e5672956e51c55771e83f463220ed02e4999e1e49a5040df0d366d
kernel-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 44ecaad1897ebf818bec3c93a2ace92211b34ce1808ec572955eb2ac60a8a19c
kernel-debuginfo-common-ppc64le-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 69bff28b55f025581c80c1befcfd8ec2e510fa5eef0778a0b914addb760cafaa
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 776ac06c544204701949d3dc439800c8bca9a2ca8a577ee7a2ebc01e2d08b47f
kernel-tools-libs-devel-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 22ff6b2c4a716c64004ec5832be8334c772ee59c7f77e2430b658134840e9293
perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 5ab6057857dd56c4b895f3c2628bf88c0aa927a035d503a6968da4e0a5b1bc14
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.ppc64le.rpm SHA-256: 1b08799aca22a7fe7398d1f801964352aa617834db98c5152ea940f3132dde03

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6

SRPM
aarch64
bpftool-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 384fa841602cc1c377c6ef2003ada4753eb3753249bab887f34b98747ba41a6a
kernel-debug-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: abf53002a237cf4ccd65ac3ac5e8aea9415ce6df596e75464481e44c4034111f
kernel-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 73e7ea87035f844c69f1bd297b2787412a7acbdbc85daf116cb84262610ac31a
kernel-debuginfo-common-aarch64-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 39c4744ce1e031dbe1ccb43c0baea972cd7db465228c2756cc517a96dc4702c5
kernel-tools-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 43447b3f85ed914ba4482444f389589ee2286f003ecf5ea981eeb962a52f6e07
kernel-tools-libs-devel-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 8524e09e6fc975e8a3afe83dddf38db60005e0a5aa401f69639aa89808f92954
perf-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: a01dd697d660f91ec037f03c77171f608491d2b41dfb6abc88adb9a826fcbc42
python3-perf-debuginfo-4.18.0-372.91.1.el8_6.aarch64.rpm SHA-256: 65364714c12d2a49d2f632c249ad5eac8493e14c983840f505bee1373562f5c8

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility