Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:7000 - Security Advisory
Issued:
2024-09-24
Updated:
2024-09-24

RHSA-2024:7000 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):

CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64
  • Red Hat CodeReady Linux Builder for x86_64 8 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 8 aarch64

Fixes

  • BZ - 2258012 - CVE-2022-48619 kernel: event code falling outside of a bitmap in input_set_capability() leads to panic
  • BZ - 2258013 - CVE-2023-6040 kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable()
  • BZ - 2260038 - CVE-2024-23848 kernel: use-after-free in cec_queue_msg_fh
  • BZ - 2265799 - CVE-2024-26595 kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
  • BZ - 2265838 - CVE-2024-26600 kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
  • BZ - 2266358 - CVE-2023-52470 kernel: null-ptr-deref in alloc_workqueue
  • BZ - 2266750 - CVE-2021-46984 kernel: kyber: fix out of bounds access when preempted
  • BZ - 2267036 - CVE-2023-52478 kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
  • BZ - 2267041 - CVE-2023-52476 kernel: perf/x86/lbr: Filter vsyscall addresses
  • BZ - 2267795 - CVE-2023-52522 kernel: net: fix possible store tearing in neigh_periodic_work()
  • BZ - 2267916 - CVE-2021-47101 kernel: asix: fix uninit-value in asix_mdio_read()
  • BZ - 2267925 - CVE-2021-47097 kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()
  • BZ - 2268295 - CVE-2023-52605 kernel: ACPI: extlog: fix NULL pointer dereference check
  • BZ - 2270103 - CVE-2024-26638 kernel: nbd: always initialize struct msghdr completely
  • BZ - 2271648 - CVE-2024-26645 kernel: tracing: Ensure visibility when inserting an element into tracing_map
  • BZ - 2271796 - CVE-2024-26649 kernel: null pointer when load rlc firmware
  • BZ - 2272793 - CVE-2024-26665 kernel: tunnels: fix out of bounds access when building IPv6 PMTU error
  • BZ - 2273141 - CVE-2024-26720 kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again
  • BZ - 2273148 - CVE-2024-26717 kernel: HID: i2c-hid-of: fix NULL-deref on failed power up
  • BZ - 2273180 - CVE-2024-26769 kernel: nvmet-fc: avoid deadlock on delete association path
  • BZ - 2275558 - CVE-2024-26846 kernel: nvme-fc: do not wait in vain when unloading module
  • BZ - 2275661 - CVE-2024-26894 kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
  • BZ - 2275690 - CVE-2024-26880 kernel: dm: call the resume method on internal suspend
  • BZ - 2275742 - CVE-2024-26855 kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
  • BZ - 2277171 - CVE-2024-26923 kernel: af_unix: Fix garbage collector racing against connect()
  • BZ - 2278220 - CVE-2024-26939 kernel: drm/i915/vma: Fix UAF on destroy against retire race
  • BZ - 2278270 - CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev
  • BZ - 2278447 - CVE-2024-27042 kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
  • BZ - 2281217 - CVE-2024-35809 kernel: PCI/PM: Drain runtime-idle callbacks before driver removal
  • BZ - 2281317 - CVE-2023-52683 kernel: ACPI: LPIT: Avoid u32 multiplication overflow
  • BZ - 2281704 - CVE-2024-35884 kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel
  • BZ - 2281720 - CVE-2024-35877 kernel: x86/mm/pat: fix VM_PAT handling in COW mappings
  • BZ - 2281807 - CVE-2024-35944 kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
  • BZ - 2281847 - CVE-2024-35989 kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms
  • BZ - 2282324 - CVE-2021-47412 kernel: block: don't call rq_qos_ops->done_bio if the bio isn't tracked
  • BZ - 2282345 - CVE-2021-47393 kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
  • BZ - 2282354 - CVE-2021-47386 kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
  • BZ - 2282355 - CVE-2021-47385 kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
  • BZ - 2282356 - CVE-2021-47384 kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
  • BZ - 2282357 - CVE-2021-47383 kernel: tty: Fix out-of-bound vmalloc access in imageblit
  • BZ - 2282366 - CVE-2021-47432 kernel: lib/generic-radix-tree.c: Don't overflow in peek()
  • BZ - 2282401 - CVE-2021-47352 kernel: virtio-net: Add validation for used length
  • BZ - 2282422 - CVE-2021-47338 kernel: fbmem: Do not delete the mode that is still in use
  • BZ - 2282440 - CVE-2021-47321 kernel: watchdog: Fix possible use-after-free by calling del_timer_sync()
  • BZ - 2282508 - CVE-2021-47289 kernel: ACPI: fix NULL pointer dereference
  • BZ - 2282511 - CVE-2021-47287 kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail
  • BZ - 2282648 - CVE-2023-52798 kernel: wifi: ath11k: fix dfs radar event locking
  • BZ - 2282669 - CVE-2023-52809 kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()
  • BZ - 2282676 - CVE-2023-52817 kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
  • BZ - 2282757 - CVE-2023-52840 kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
  • BZ - 2282764 - CVE-2023-52800 kernel: wifi: ath11k: fix htt pktlog locking
  • BZ - 2282851 - CVE-2021-47441 kernel: mlxsw: thermal: Fix out-of-bounds memory accesses
  • BZ - 2282890 - CVE-2021-47466 kernel: mm, slub: fix potential memoryleak in kmem_cache_open()
  • BZ - 2282903 - CVE-2021-47455 kernel: ptp: Fix possible memory leak in ptp_clock_register()
  • BZ - 2282918 - CVE-2021-47497 kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
  • BZ - 2283389 - CVE-2021-47560 kernel: mlxsw: spectrum: Protect driver from buggy firmware
  • BZ - 2283424 - CVE-2021-47527 kernel: serial: core: fix transmit-buffer reset and memleak
  • BZ - 2284271 - CVE-2024-36883 kernel: net: fix out-of-bounds access in ops_init
  • BZ - 2284511 - CVE-2024-36922 kernel: wifi: iwlwifi: read txq->read_ptr under lock
  • BZ - 2284515 - CVE-2024-36920 kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
  • BZ - 2284545 - CVE-2024-36902 kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
  • BZ - 2284596 - CVE-2024-36953 kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
  • BZ - 2284628 - CVE-2024-36939 kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().
  • BZ - 2284630 - CVE-2024-36919 kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
  • BZ - 2284634 - CVE-2024-36901 kernel: ipv6: prevent NULL dereference in ip6_output()
  • BZ - 2293247 - CVE-2021-47582 kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable
  • BZ - 2293270 - CVE-2021-47609 kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver
  • BZ - 2293273 - CVE-2024-38619 kernel: usb-storage: alauda: Check whether the media is initialized
  • BZ - 2293304 - CVE-2022-48754 kernel: phylib: fix potential use-after-free
  • BZ - 2293377 - CVE-2022-48760 kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers
  • BZ - 2293408 - CVE-2024-38581 kernel: drm/amdgpu/mes: fix use-after-free issue
  • BZ - 2293414 - CVE-2024-38579 kernel: crypto: bcm - Fix pointer arithmetic
  • BZ - 2293423 - CVE-2024-38570 kernel: gfs2: Fix potential glock use-after-free on unmount
  • BZ - 2293440 - CVE-2024-38559 kernel: scsi: qedf: Ensure the copied buf is NUL terminated
  • BZ - 2293441 - CVE-2024-38558 kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6
  • BZ - 2293658 - CVE-2024-37356 kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
  • BZ - 2294313 - CVE-2024-39471 kernel: drm/amdgpu: add error handle to avoid out-of-bounds
  • BZ - 2297471 - CVE-2024-39499 kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()
  • BZ - 2297473 - CVE-2024-39501 kernel: drivers: core: synchronize really_probe() and dev_uevent()
  • BZ - 2297478 - CVE-2024-39506 kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
  • BZ - 2297488 - CVE-2024-40904 kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
  • BZ - 2297495 - CVE-2024-40911 kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station
  • BZ - 2297496 - CVE-2024-40912 kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
  • BZ - 2297513 - CVE-2024-40929 kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
  • BZ - 2297515 - CVE-2024-40931 kernel: mptcp: ensure snd_una is properly initialized on connect
  • BZ - 2297525 - CVE-2024-40941 kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation
  • BZ - 2297538 - CVE-2024-40954 kernel: net: do not leave a dangling sk pointer, when socket creation fails
  • BZ - 2297542 - CVE-2024-40958 kernel: netns: Make get_net_ns() handle zero refcount net
  • BZ - 2297543 - CVE-2024-40959 kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
  • BZ - 2297544 - CVE-2024-40960 kernel: ipv6: prevent possible NULL dereference in rt6_probe()
  • BZ - 2297556 - CVE-2024-40972 kernel: ext4: do not create EA inode under buffer lock
  • BZ - 2297561 - CVE-2024-40977 kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
  • BZ - 2297562 - CVE-2024-40978 kernel: scsi: qedi: Fix crash while reading debugfs attribute
  • BZ - 2297572 - CVE-2024-40988 kernel: drm/radeon: fix UBSAN warning in kv_dpm.c
  • BZ - 2297573 - CVE-2024-40989 kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown
  • BZ - 2297579 - CVE-2024-40995 kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
  • BZ - 2297581 - CVE-2024-40997 kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
  • BZ - 2297582 - CVE-2024-40998 kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
  • BZ - 2297589 - CVE-2024-41005 kernel: netpoll: Fix race condition in netpoll_owner_active
  • BZ - 2297706 - CVE-2024-40901 kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
  • BZ - 2297909 - CVE-2024-41007 kernel: tcp: avoid too many retransmit packets
  • BZ - 2298079 - CVE-2024-41008 kernel: drm/amdgpu: change vm->task_info handling
  • BZ - 2298140 - CVE-2022-48804 kernel: vt_ioctl: fix array_index_nospec in vt_setactivate
  • BZ - 2298177 - CVE-2022-48836 kernel: Input: aiptek - properly check endpoint type
  • BZ - 2298640 - CVE-2022-48866 kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
  • BZ - 2299240 - CVE-2024-41090 kernel: virtio-net: tap: mlx5_core short frame denial of service
  • BZ - 2299336 - CVE-2024-41091 kernel: virtio-net: tun: mlx5_core short frame denial of service
  • BZ - 2299452 - CVE-2024-41012 kernel: filelock: Remove locks reliably when fcntl/close race is detected
  • BZ - 2300296 - CVE-2024-41013 kernel: xfs: don't walk off the end of a directory data block
  • BZ - 2300297 - CVE-2024-41014 kernel: xfs: add bounds checking to xlog_recover_process_data
  • BZ - 2300381 - CVE-2024-41023 kernel: sched/deadline: Fix task_struct reference leak
  • BZ - 2300402 - CVE-2024-41035 kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
  • BZ - 2300407 - CVE-2024-41038 kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
  • BZ - 2300408 - CVE-2024-41039 kernel: firmware: cs_dsp: Fix overflow checking of wmfw header
  • BZ - 2300409 - CVE-2024-41040 kernel: net/sched: Fix UAF when resolving a clash
  • BZ - 2300410 - CVE-2024-41041 kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port()
  • BZ - 2300414 - CVE-2024-41044 kernel: ppp: reject claimed-as-LCP but actually malformed packets
  • BZ - 2300429 - CVE-2024-41055 kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()
  • BZ - 2300430 - CVE-2024-41056 kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
  • BZ - 2300434 - CVE-2024-41060 kernel: drm/radeon: check bo_va->bo is non-NULL before using it
  • BZ - 2300439 - CVE-2024-41064 kernel: powerpc/eeh: avoid possible crash when edev->pdev changes
  • BZ - 2300440 - CVE-2024-41065 kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace
  • BZ - 2300448 - CVE-2024-41071 kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
  • BZ - 2300453 - CVE-2024-41076 kernel: NFSv4: Fix memory leak in nfs4_set_security_label
  • BZ - 2300492 - CVE-2024-41097 kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()
  • BZ - 2300533 - CVE-2024-42084 kernel: ftruncate: pass a signed offset
  • BZ - 2300552 - CVE-2024-42090 kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
  • BZ - 2300709 - CVE-2024-42094 kernel: net/iucv: Avoid explicit cpumask var allocation on stack
  • BZ - 2300713 - CVE-2024-42096 kernel: x86: stop playing stack games in profile_pc()
  • BZ - 2301477 - CVE-2024-42114 kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
  • BZ - 2301489 - CVE-2024-42124 kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible
  • BZ - 2301496 - CVE-2024-42131 kernel: mm: avoid overflows in dirty throttling logic
  • BZ - 2301519 - CVE-2024-42152 kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment
  • BZ - 2301522 - CVE-2024-42154 kernel: tcp_metrics: validate source addr length
  • BZ - 2301543 - CVE-2024-42225 kernel: wifi: mt76: replace skb_put with skb_put_zero
  • BZ - 2301544 - CVE-2024-42226 kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB
  • BZ - 2303077 - CVE-2024-42228 kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
  • RHEL-31515 - nfsd: crash while testing a lock on a re-exported nfs v3 mount simultaneously from local system and client

CVEs

  • CVE-2021-46984
  • CVE-2021-47097
  • CVE-2021-47101
  • CVE-2021-47287
  • CVE-2021-47289
  • CVE-2021-47321
  • CVE-2021-47338
  • CVE-2021-47352
  • CVE-2021-47383
  • CVE-2021-47384
  • CVE-2021-47385
  • CVE-2021-47386
  • CVE-2021-47393
  • CVE-2021-47412
  • CVE-2021-47432
  • CVE-2021-47441
  • CVE-2021-47455
  • CVE-2021-47466
  • CVE-2021-47497
  • CVE-2021-47527
  • CVE-2021-47560
  • CVE-2021-47582
  • CVE-2021-47609
  • CVE-2022-48619
  • CVE-2022-48754
  • CVE-2022-48760
  • CVE-2022-48804
  • CVE-2022-48836
  • CVE-2022-48866
  • CVE-2022-49226
  • CVE-2022-49316
  • CVE-2023-6040
  • CVE-2023-52470
  • CVE-2023-52476
  • CVE-2023-52478
  • CVE-2023-52522
  • CVE-2023-52605
  • CVE-2023-52683
  • CVE-2023-52798
  • CVE-2023-52800
  • CVE-2023-52809
  • CVE-2023-52817
  • CVE-2023-52840
  • CVE-2024-23848
  • CVE-2024-26595
  • CVE-2024-26600
  • CVE-2024-26638
  • CVE-2024-26645
  • CVE-2024-26649
  • CVE-2024-26665
  • CVE-2024-26717
  • CVE-2024-26720
  • CVE-2024-26769
  • CVE-2024-26846
  • CVE-2024-26855
  • CVE-2024-26880
  • CVE-2024-26894
  • CVE-2024-26923
  • CVE-2024-26939
  • CVE-2024-27013
  • CVE-2024-27042
  • CVE-2024-35809
  • CVE-2024-35877
  • CVE-2024-35884
  • CVE-2024-35944
  • CVE-2024-35989
  • CVE-2024-36883
  • CVE-2024-36901
  • CVE-2024-36902
  • CVE-2024-36919
  • CVE-2024-36920
  • CVE-2024-36922
  • CVE-2024-36939
  • CVE-2024-36953
  • CVE-2024-37356
  • CVE-2024-38558
  • CVE-2024-38559
  • CVE-2024-38570
  • CVE-2024-38579
  • CVE-2024-38581
  • CVE-2024-38619
  • CVE-2024-39471
  • CVE-2024-39499
  • CVE-2024-39501
  • CVE-2024-39506
  • CVE-2024-40901
  • CVE-2024-40904
  • CVE-2024-40911
  • CVE-2024-40912
  • CVE-2024-40929
  • CVE-2024-40931
  • CVE-2024-40941
  • CVE-2024-40954
  • CVE-2024-40958
  • CVE-2024-40959
  • CVE-2024-40960
  • CVE-2024-40972
  • CVE-2024-40977
  • CVE-2024-40978
  • CVE-2024-40988
  • CVE-2024-40989
  • CVE-2024-40995
  • CVE-2024-40997
  • CVE-2024-40998
  • CVE-2024-41005
  • CVE-2024-41007
  • CVE-2024-41008
  • CVE-2024-41012
  • CVE-2024-41013
  • CVE-2024-41014
  • CVE-2024-41023
  • CVE-2024-41035
  • CVE-2024-41038
  • CVE-2024-41039
  • CVE-2024-41040
  • CVE-2024-41041
  • CVE-2024-41044
  • CVE-2024-41055
  • CVE-2024-41056
  • CVE-2024-41060
  • CVE-2024-41064
  • CVE-2024-41065
  • CVE-2024-41071
  • CVE-2024-41076
  • CVE-2024-41090
  • CVE-2024-41091
  • CVE-2024-41097
  • CVE-2024-42084
  • CVE-2024-42090
  • CVE-2024-42094
  • CVE-2024-42096
  • CVE-2024-42114
  • CVE-2024-42124
  • CVE-2024-42131
  • CVE-2024-42152
  • CVE-2024-42154
  • CVE-2024-42225
  • CVE-2024-42226
  • CVE-2024-42228
  • CVE-2024-42237
  • CVE-2024-42238
  • CVE-2024-42240
  • CVE-2024-42246
  • CVE-2024-42265
  • CVE-2024-42322
  • CVE-2024-43830
  • CVE-2024-43871
  • CVE-2024-45026

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
kernel-4.18.0-553.22.1.el8_10.src.rpm SHA-256: f93b34923c96b0c1763104051b97296ab3674f87e52d480e2212afcd4c9936e3
x86_64
bpftool-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 277abbea6eac6dd331e1dd05e7460eb7974629e5452d14afae271cef8ca06ffe
bpftool-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: fba5275a4ef01b84391ac7d07500d7cf381207f5ede4b0f5496524f94274f0c3
kernel-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 51cd8ddc5f83f3392e5c1a95611bebb0a37a80e95d7b90119f725819c8388ec1
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: 888e39f1358cbcce35984f2dcbba8ed1488ca7b8d586c1bf2d4355dd49be8f66
kernel-core-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 6094664ffea294377918f3f2382446a164875cd707842be5e3867455fb69c059
kernel-cross-headers-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: c4579252cb078e4ac560197993a9ff99f7c2f92054d21f300e67da0d06040a5d
kernel-debug-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: a3a7cd59961cc0fc0f713e906aad9f3d3b5a9e46df639b7b731cdc49233b971e
kernel-debug-core-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 34f3d70ff71d55f8cc7368b94fec3d29e8b19f2881c6f8d899c66a1ff275329c
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 1243228e5794bf1b24a1d7767fec4023d39119891a687a184d9a45c6ab05c595
kernel-debug-devel-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 1c3abcb307f4e8f3971ebb37e6d11ea84699ef60df17b631354cdd7ab3611493
kernel-debug-modules-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: bdcf3367506c69af999f29080d6b1d3f7da20efb1266d813e024ea76ad09927f
kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 9b217caab2063dd9e74d15be4da3347e1f01987ffbd1b967762cf7c5618a383b
kernel-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: a3cb46ab8eb7d90a4c6e59c44a666678b6f13a78d54ca209b61c383697c8b07b
kernel-debuginfo-common-x86_64-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 42f2acaea996b1485431201c7def97557f6f2357ef57a83f828b03dd6cd67e66
kernel-devel-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 3877057ce1738b9f679d01f4200669d0e6c7cc6bdcd0d79684b116e35340a640
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: e775af49dd04e0fc8cdf87ebe8e32408a83d78f48a50960f64653fd1fcd6deaf
kernel-headers-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 19e6e2263e3fb21394e0681496963ed768f4749d493ba15caa602c203284579d
kernel-modules-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: d834374af3c7962fbb725ca41114123c31032d40d6fd79742f92a51ce790d69d
kernel-modules-extra-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 8b58ad01af2374685ab63d2b48e70426ab90a5c7212351017ebd5e7355fdd588
kernel-tools-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: d0b3941ff22eb0f7509681e3ad2c09506c9d42caa104d0f7c119d98d3074f7d3
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 1513b429e63065efb89430ce7f1d70430092a71198f06d887e1c53205a0c6512
kernel-tools-libs-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 9c7856b67c58c67fb98b5f423ee619e33f9d1451ea4441d95f7a802605b795b8
perf-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: f0b595db5cc3520e5f20dae42c08ae3d2e4016470a7f7f8a8b7ba40642bc027e
perf-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: f232d37e55acd3629e1c126e0fb3166b2c76f3aa0cc2ed013352d2c5e0af4936
python3-perf-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 77d1aa66102bb95bb4a2cccacabab20ce7f8a2b5dabca10faea1debbd487642c
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: eaecf7b6186940f95162f12f03fcb956896a40ec53289bab6321a8bda52e5fea

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
kernel-4.18.0-553.22.1.el8_10.src.rpm SHA-256: f93b34923c96b0c1763104051b97296ab3674f87e52d480e2212afcd4c9936e3
s390x
bpftool-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 5ab83e8590d5c5326004f284056c27537acd805c40b796f96d1912043a7d60e8
bpftool-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: fdc5e32c7e578b7ab5268fe2e277a03155a9f808c1c3de355f5e57a3ea814b6a
kernel-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: c9f2138972a178ee1eba3bb9dfb2771d32c9e38cc3ae6aa8a7791b00e1e06dff
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: 888e39f1358cbcce35984f2dcbba8ed1488ca7b8d586c1bf2d4355dd49be8f66
kernel-core-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: aeeaaff148ad22b1f0b8cb4314dbbee735d055b19324dee759f746556389f8b5
kernel-cross-headers-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: b846dc193f02a636c0258edd9d93cf37a30434947d61ac64854d37d92caac88a
kernel-debug-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: f5609038afd1ae50837add6e5664fc4ba1730c431f74117ca73958bce7e86943
kernel-debug-core-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 7623a6177f3facbae28186fb874671861a42aa5ce450aabb73673ae3b3b70b90
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: b4c1e9a35368d760522fb4665d95e624754d8664f099c2a6a8bd01ed14c9b841
kernel-debug-devel-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 5895a0faeb387b505d605de8b883e45aea5188f4c135fa43dfd716f7fffda9cf
kernel-debug-modules-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 9d5d15255ce29afa34a724fc1cf9fa57c08472b9e53773620da0ab9dcb1e08a5
kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 1ef3fbac753f924673ca02c664c53a24b8a3e5bbdf575821dc26c0a7b4fa49c3
kernel-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: d2d9269aafd80de0827d1d266f664af9c83d5f5206a7faf925ab3ef38cb2fbf9
kernel-debuginfo-common-s390x-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 88d84feedf97529208d4e3a02d469b7fa9a1a30b031afb272540756c819de271
kernel-devel-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 7170c2f603911a628409a8293c198007b7fadbbf3b1511119a9530db52f23b2a
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: e775af49dd04e0fc8cdf87ebe8e32408a83d78f48a50960f64653fd1fcd6deaf
kernel-headers-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 24e04855cc3c062a357e51146864e2b0bee6ff2223917a8d10638f12fe4d9ab8
kernel-modules-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 4b7a17da5c6ab91c126093f972381b9e460f982e436f3ebdfb01bea2fd668fef
kernel-modules-extra-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 2dc2b686dcba894a3c25708e00799f390ed42f75cdea8d1cc020574f90519b68
kernel-tools-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 7f8a94c004fd80d6bc5e948a2f803938d7366bb70b9bcc7f3dac70c5dad50ce4
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 113a12df3e55cde7ce015ffcbcbbf7531829caffad3b05f49858e385d57529cd
kernel-zfcpdump-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 6a935e35245be7d9506fbd0c6043651b067ba5d8b1c5803cde1a9a44d25dbfa1
kernel-zfcpdump-core-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 1f0085bed2622c3a34b2e5b67de4487ba6c7ff7c1e36eae447cdaf0ce498ae80
kernel-zfcpdump-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: ef0094bb7f790c9d3e1a7ad73a6554a97a69d0e55cb46c1d37298ea375696576
kernel-zfcpdump-devel-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 96a34949000274f33238f1c5467318fc0b384c178ef6479aa8679c4c6266dd11
kernel-zfcpdump-modules-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 7585e2647c5051c0d1733523713858cf9efbf16a88f8072c7e5b7ad9a6f4773e
kernel-zfcpdump-modules-extra-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: aa967647e8dc5da30f07813310e6fda7e9df93d3ef214e58cf1efd87b8f304f2
perf-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 558d68fd2c13c0a5ac9bab501704eae7fbca344c119d012378c527cd6f28785a
perf-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 527170517d7b42c457c2227655507aa245c0bfae34ed3807d5ece797fc7c5db8
python3-perf-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: ca2b9c7d6e8e91ae4697a64775e18831f47cb217254df1a65f39ca7caeaf11bb
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.s390x.rpm SHA-256: 78f035d5f4ab12f44586bfa6f6baced6313ff8a291e1fb35d94069a1a4a5ecfe

Red Hat Enterprise Linux for Power, little endian 8

SRPM
kernel-4.18.0-553.22.1.el8_10.src.rpm SHA-256: f93b34923c96b0c1763104051b97296ab3674f87e52d480e2212afcd4c9936e3
ppc64le
bpftool-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: e5fbe84b85179c73c0ff19cb3b3357105ef5e87f19d7e4d5dfba507f5344d1cc
bpftool-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: bf5021374f37e469ed0ca46f5debdca0f8c89d5b7871ec3dc5e7a86ef08c7b62
kernel-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 6b8678d417dcfb663ca45f7afd17b899fcb6696dff284756f310d3616aa48718
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: 888e39f1358cbcce35984f2dcbba8ed1488ca7b8d586c1bf2d4355dd49be8f66
kernel-core-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 4c25546b9bfffc3040e273c7e5b36a393af04ffd3a75577147f1656b7adf8a2a
kernel-cross-headers-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: a65d48b08f724be4f7bd9af050aaeeaefb77cb4ab78134e28408e2fa7fa811a2
kernel-debug-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 23288e55d9d0583dbabe98d1ed41d0ea70969a9b3759aa1205930579dc762857
kernel-debug-core-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 94a0acf221459c88b0c172573427893297415dcc2f29886049124cbd23d3b544
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: dd852ac522f9ae5ecf86dd3b7902db08034cc1264b6544f21fe9ba84c72bd3bf
kernel-debug-devel-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 0d513bc46caeb6c5223f3c80b3bea8cba22662f162f51c248d4a5a17b4940150
kernel-debug-modules-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: d3097d2734b51cd25226f5ac0e3d19b9173f57a32e8cf28b6a0f8253e903143f
kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: ca3809ce3638d54be252173e167dddaa3647f3a1a73b370771d80076b345537a
kernel-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 3847ac1e99ad537b0f04c54d4caae135839c274aed8b07b70957e63be3951834
kernel-debuginfo-common-ppc64le-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: af9bf6375066696081887af5beef68d690e33808cbdf0baa100533cdf6eacd48
kernel-devel-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 89db189e334f81eea1492de2ac2f9a5a2ccb8a19770b424aea30fbe3af5a41da
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: e775af49dd04e0fc8cdf87ebe8e32408a83d78f48a50960f64653fd1fcd6deaf
kernel-headers-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 321dec1c56d91b9ff752d73c77e1b30c4358a3ad053329e4ac737d4ed92108d1
kernel-modules-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 8d14b2d1902bcac2579b9fb530316f98814b4cf06e0caa988f3e3b11203fe699
kernel-modules-extra-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 2a86c20062f10e5dfcade55f388b3c6c45ccf9e0ae83d36babd5b1a9607dcf84
kernel-tools-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 35ba11188ac87d43cef22f57cc9e8ec208093d482ce9e49894725e3ec7f54c9e
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: e4282711dc458978f98819b81ad52e3b535f733fe6e6f3254c9eb4d68d7d350a
kernel-tools-libs-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 8a9d6f1d3fc1fea7538cad96be414efacfd8500a0ee6d67b093f09dd1f630f0c
perf-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 2b7cde7a760e4c1bcb30346407c0b3b37f7d67e92065d201832e381cce297bfc
perf-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 51c2747356adf49dcc72498f710d6fe529151591c49f734ce4aed6a407b61ced
python3-perf-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 996accfa9f68f9a55dbf8d5febc3282363e0637775f689250dda5bc5d53aff34
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: b86da0b0b7ea101abfb7fb589f8e1f64219fa798669b191dadebff398278126b

Red Hat Enterprise Linux for ARM 64 8

SRPM
kernel-4.18.0-553.22.1.el8_10.src.rpm SHA-256: f93b34923c96b0c1763104051b97296ab3674f87e52d480e2212afcd4c9936e3
aarch64
bpftool-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: ae758a365ca4a02103aa91c74a2db62900148dedeec11925fd74dd6994f87fa4
bpftool-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 7a811bcd974073e4d6180b55cfeb17b11977961b5defd76587236829b6ec5b31
kernel-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: f23eff69b7aa09ec3b41298cb0df2f0d8cc684ecae1976e124afe0cc89e29404
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: 888e39f1358cbcce35984f2dcbba8ed1488ca7b8d586c1bf2d4355dd49be8f66
kernel-core-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 02ffd7e667ef14494deeff03be3eea64d1a300a30165d9f8a7f06c1ebfd6a28e
kernel-cross-headers-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: ab4ce3158e02a3d02d7edfaa73e17d9dd6e32c0ded863b4ea2ca333e2fb17250
kernel-debug-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 6e88a8e5cf9001de92e417fa762a82c2f1f601d7ffbaf26453e8bd1641df386c
kernel-debug-core-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: d2679a7c00ddabb8d2c5e91fab5cd8453c54239d195ab19ad48beb4ed09525c3
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: d0a41783fe78ba8bcefbe4d4c56655cf5229c767712fff3165e0614efaffb7a4
kernel-debug-devel-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 05534d31bca08a9c5863a055d580086290667f6710ee00dcb50c1c39e2750046
kernel-debug-modules-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 51cb10f22c40f955a803bb54e42ae980a6f64565cb6c37a220f03deb140459c0
kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 5b7cd613d2543ee890fa96a9bc25f42785a0a8ebaa6cfd33ffe16b89b3c86997
kernel-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 2826178d6b09cf11c3419f8caa3e26c71124f669dc34314e80d26e873a4e2735
kernel-debuginfo-common-aarch64-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 77e11caf81814f0f47de4ee18cdb3fd13a864e517f7753da2c896c8b7d9fa172
kernel-devel-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 1a0a9c8a818a754445bfb5e31edda674ec0211b5c79d4456c5bfa049c6336dd9
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm SHA-256: e775af49dd04e0fc8cdf87ebe8e32408a83d78f48a50960f64653fd1fcd6deaf
kernel-headers-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 1c77bd5832140dfb83f1f23dc538e84f4576b05127a8a3e98fefc3f4b8e9888e
kernel-modules-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 9431151bebfcec753572836602b887156d0a9a29bcdaaa4efd82668f195c1d70
kernel-modules-extra-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: aa7b15c31d32104929fc46d3da9dbfec66a8f2950ccfdc7458b7c23371c9a3c0
kernel-tools-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 8fc0c5e8006355b6ef396ac5a3312cb9e8713ec7a69c6735423f7ba3a3ec9d18
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 482119da5efa58592d301c9b31bc9b9fabe2b47ef0083522dd79d96f0f6f3787
kernel-tools-libs-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 257db73bddd39c854616ce9bbc3e500a887ca03b8e673f7a3ef4fc68d890b6e1
perf-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 67625b67f3d459b5a60cf6bfb9c59be50ad9f4ac864ac223b687cc6f0a7668f8
perf-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 28b028df95222ecbff08bbfe3cbbddf179663ceab1429bb39b4669e0372927dc
python3-perf-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 070d73f82e9f1f1bffb9dcc9962528f79202c005f4cff7659ae944956b390dd2
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 25d91bb8b2e4fa4097e4fcd343f21661cde6c69a4d5254c8e476597968ba2330

Red Hat CodeReady Linux Builder for x86_64 8

SRPM
x86_64
bpftool-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: fba5275a4ef01b84391ac7d07500d7cf381207f5ede4b0f5496524f94274f0c3
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 1243228e5794bf1b24a1d7767fec4023d39119891a687a184d9a45c6ab05c595
kernel-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: a3cb46ab8eb7d90a4c6e59c44a666678b6f13a78d54ca209b61c383697c8b07b
kernel-debuginfo-common-x86_64-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 42f2acaea996b1485431201c7def97557f6f2357ef57a83f828b03dd6cd67e66
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 1513b429e63065efb89430ce7f1d70430092a71198f06d887e1c53205a0c6512
kernel-tools-libs-devel-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: 646f52da72ddae466fb974656bb3d44f0bf40e698a6d79c3e273f4e7aa584808
perf-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: f232d37e55acd3629e1c126e0fb3166b2c76f3aa0cc2ed013352d2c5e0af4936
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.x86_64.rpm SHA-256: eaecf7b6186940f95162f12f03fcb956896a40ec53289bab6321a8bda52e5fea

Red Hat CodeReady Linux Builder for Power, little endian 8

SRPM
ppc64le
bpftool-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: bf5021374f37e469ed0ca46f5debdca0f8c89d5b7871ec3dc5e7a86ef08c7b62
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: dd852ac522f9ae5ecf86dd3b7902db08034cc1264b6544f21fe9ba84c72bd3bf
kernel-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 3847ac1e99ad537b0f04c54d4caae135839c274aed8b07b70957e63be3951834
kernel-debuginfo-common-ppc64le-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: af9bf6375066696081887af5beef68d690e33808cbdf0baa100533cdf6eacd48
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: e4282711dc458978f98819b81ad52e3b535f733fe6e6f3254c9eb4d68d7d350a
kernel-tools-libs-devel-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: d1782386c9897d6a5ff8882f628c3409fe98afc0242f380096041ccad222eeb8
perf-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: 51c2747356adf49dcc72498f710d6fe529151591c49f734ce4aed6a407b61ced
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.ppc64le.rpm SHA-256: b86da0b0b7ea101abfb7fb589f8e1f64219fa798669b191dadebff398278126b

Red Hat CodeReady Linux Builder for ARM 64 8

SRPM
aarch64
bpftool-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 7a811bcd974073e4d6180b55cfeb17b11977961b5defd76587236829b6ec5b31
kernel-debug-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: d0a41783fe78ba8bcefbe4d4c56655cf5229c767712fff3165e0614efaffb7a4
kernel-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 2826178d6b09cf11c3419f8caa3e26c71124f669dc34314e80d26e873a4e2735
kernel-debuginfo-common-aarch64-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 77e11caf81814f0f47de4ee18cdb3fd13a864e517f7753da2c896c8b7d9fa172
kernel-tools-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 482119da5efa58592d301c9b31bc9b9fabe2b47ef0083522dd79d96f0f6f3787
kernel-tools-libs-devel-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: fda358ddae2b801dd933419624dca28dae00b9e244c928f24c705de48052708c
perf-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 28b028df95222ecbff08bbfe3cbbddf179663ceab1429bb39b4669e0372927dc
python3-perf-debuginfo-4.18.0-553.22.1.el8_10.aarch64.rpm SHA-256: 25d91bb8b2e4fa4097e4fcd343f21661cde6c69a4d5254c8e476597968ba2330

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility