Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2024.0557 kernel security and bug fix update 29 January 2024 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2024-0562 CVE-2023-45871 CVE-2023-42753 CVE-2023-38409 CVE-2023-35824 CVE-2023-35823 CVE-2023-33203 CVE-2023-31436 CVE-2023-26545 CVE-2023-23454 CVE-2023-5178 CVE-2023-4732 CVE-2023-4623 CVE-2023-4622 CVE-2023-4459 CVE-2023-3812 CVE-2023-3772 CVE-2023-3611 CVE-2023-3567 CVE-2023-3268 CVE-2023-3161 CVE-2023-2513 CVE-2023-2194 CVE-2023-2163 CVE-2023-2162 CVE-2023-1998 CVE-2023-1855 CVE-2023-1838 CVE-2023-1382 CVE-2023-1195 CVE-2023-1192 CVE-2023-1079 CVE-2023-1073 CVE-2023-0394 CVE-2022-47929 CVE-2022-43750 CVE-2022-41858 CVE-2022-41218 CVE-2022-40982 CVE-2022-30594 CVE-2022-20141 CVE-2022-4129 CVE-2022-3628 CVE-2022-3567 CVE-2022-3522 CVE-2022-3028 CVE-2022-1679 CVE-2022-1016 CVE-2022-0854 Original Bulletin: https://access.redhat.com/errata/RHSA-2024:0412 Comment: CVSS (Max): 9.8 CVE-2023-5178 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2024:0412 Product: Red Hat Enterprise Linux BaseOS EUS (v.8.6) Advisory URL: https://access.redhat.com/errata/RHSA-2024:0412 Issue date: 2024-01-25 CVE Names: CVE-2022-0854 CVE-2022-1016 CVE-2022-1679 CVE-2022-3028 CVE-2022-3522 CVE-2022-3567 CVE-2022-3628 CVE-2022-4129 CVE-2022-20141 CVE-2022-30594 CVE-2022-40982 CVE-2022-41218 CVE-2022-41858 CVE-2022-43750 CVE-2022-47929 CVE-2023-0394 CVE-2023-1073 CVE-2023-1079 CVE-2023-1192 CVE-2023-1195 CVE-2023-1382 CVE-2023-1838 CVE-2023-1855 CVE-2023-1998 CVE-2023-2162 CVE-2023-2163 CVE-2023-2194 CVE-2023-2513 CVE-2023-3161 CVE-2023-3268 CVE-2023-3567 CVE-2023-3611 CVE-2023-3772 CVE-2023-3812 CVE-2023-4459 CVE-2023-4622 CVE-2023-4623 CVE-2023-4732 CVE-2023-5178 CVE-2023-23454 CVE-2023-26545 CVE-2023-31436 CVE-2023-33203 CVE-2023-35823 CVE-2023-35824 CVE-2023-38409 CVE-2023-42753 CVE-2023-45871 CVE-2024-0562 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x, noarch Red Hat Virtualization 4 Hypervisor for RHEL 8 - aarch64, ppc64le, x86_64, s390x, noarch Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x, noarch 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: net/sched: multiple vulnerabilities (CVE-2023-3611, CVE-2023-4623) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in unix_stream_sendpage (CVE-2023-4622) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436) * kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * kernel: multiple race condition vulnerabilities (CVE-2022-3028, CVE-2022-3522, CVE-2023-33203, CVE-2023-35823, CVE-2023-35824, CVE-2022-3567, BZ#2230094) * kernel: swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679) * kernel: USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-4129, CVE-2022-47929, CVE-2023-0394, CVE-2023-3772, CVE-2023-4459) * kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) * hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982) * kernel: Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218) * kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip (CVE-2022-41858) * kernel: memory corruption in usbmon driver (CVE-2022-43750) * kernel: HID: multiple vulnerabilities (CVE-2023-1073, CVE-2023-1079) * kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * kernel: denial of service in tipc_conn_close (CVE-2023-1382) * kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() (CVE-2023-1838) * kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998) * Kernel: UAF during login when accessing the shost ipaddress (CVE-2023-2162) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) * kernel: ext4: use-after-free in ext4_xattr_set_entry() (CVE-2023-2513) * kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161) * kernel: out-of-bounds access in relay_file_read (CVE-2023-3268) * kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race (CVE-2023-3567) * kernel: Race between task migrating pages and another task calling exit_mmap (CVE-2023-4732) * kernel: slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454) * kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545) * kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment (CVE-2023-38409) * kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c (CVE-2024-0562) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) * kernel: use-after-free bug in remove function xgene_hwmon_remove (CVE-2023-1855) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * bpf_jit_limit hit again (BZ#2243013) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244627) * RHEL8.6 - s390/dasd: Use correct lock while counting channel queue length (BZ#2250882) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2058395 - CVE-2022-0854 - kernel: swiotlb information leak with DMA_FROM_DEVICE 2066614 - CVE-2022-1016 - kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM 2084125 - CVE-2022-1679 - kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 2122228 - CVE-2022-3028 - kernel: race condition in xfrm_probe_algs can lead to OOB read/write 2150979 - CVE-2022-3522 - kernel: race condition in hugetlb_no_page() in mm/hugetlb.c 2143943 - CVE-2022-3567 - kernel: data races around sk->sk_prot 2150960 - CVE-2022-3628 - kernel: USB-accessible buffer overflow in brcmfmac 2134528 - CVE-2022-4129 - kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference 2114937 - CVE-2022-20141 - kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets 2085300 - CVE-2022-30594 - kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option 2223949 - CVE-2022-40982 - hw: Intel: Gather Data Sampling (GDS) side channel vulnerability 2122960 - CVE-2022-41218 - kernel: Report vmalloc UAF in dvb-core/dmxdev 2144379 - CVE-2022-41858 - kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip 2151270 - CVE-2022-43750 - kernel: memory corruption in usbmon driver 2168246 - CVE-2022-47929 - kernel: NULL pointer dereference in traffic control subsystem 2162120 - CVE-2023-0394 - kernel: NULL pointer dereference in rawv6_push_pending_frames 2173403 - CVE-2023-1073 - kernel: HID: check empty report_list in hid_validate_values() 2173444 - CVE-2023-1079 - kernel: hid: Use After Free in asus_remove() 2154178 - CVE-2023-1192 - kernel: use-after-free in smb2_is_status_io_timeout() 2154171 - CVE-2023-1195 - kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c 2177371 - CVE-2023-1382 - kernel: denial of service in tipc_conn_close 2087568 - CVE-2023-1838 - kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() 2184578 - CVE-2023-1855 - kernel: use-after-free bug in remove function xgene_hwmon_remove 2187257 - CVE-2023-1998 - kernel: Spectre v2 SMT mitigations problem 2187773 - CVE-2023-2162 - kernel: UAF during login when accessing the shost ipaddress 2240249 - CVE-2023-2163 - kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe 2188396 - CVE-2023-2194 - kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() 2193097 - CVE-2023-2513 - kernel: ext4: use-after-free in ext4_xattr_set_entry() 2213485 - CVE-2023-3161 - kernel: fbcon: shift-out-of-bounds in fbcon_set_font() 2215502 - CVE-2023-3268 - kernel: out-of-bounds access in relay_file_read 2221463 - CVE-2023-3567 - kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race 2225191 - CVE-2023-3611 - kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead 2218943 - CVE-2023-3772 - kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() 2224048 - CVE-2023-3812 - kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags 2219268 - CVE-2023-4459 - kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() 2237760 - CVE-2023-4622 - kernel: use after free in unix_stream_sendpage 2237757 - CVE-2023-4623 - kernel: net/sched: sch_hfsc UAF 2236982 - CVE-2023-4732 - kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h 2241924 - CVE-2023-5178 - kernel: use after free in nvmet_tcp_free_crypto in NVMe 2168297 - CVE-2023-23454 - kernel: slab-out-of-bounds read vulnerabilities in cbq_classify 2182443 - CVE-2023-26545 - kernel: mpls: double free on sysctl allocation failure 2192671 - CVE-2023-31436 - kernel: out-of-bounds write in qfq_change_class function 2192667 - CVE-2023-33203 - kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() 2215835 - CVE-2023-35823 - kernel: saa7134: race condition leading to use-after- free in saa7134_finidev() 2215836 - CVE-2023-35824 - kernel: dm1105: race condition leading to use-after- free in dm1105_remove.c() 2230042 - CVE-2023-38409 - kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment 2239843 - CVE-2023-42753 - kernel: netfilter: potential slab-out-of-bound access due to integer underflow 2244723 - CVE-2023-45871 - kernel: IGB driver inadequate buffer size for frames larger than MTU 2258475 - CVE-2024-0562 - kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.6) aarch64: bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.87.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm Red Hat Virtualization 4 Hypervisor for RHEL 8 aarch64: bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.87.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm Red Hat CodeReady Linux Builder EUS (v.8.6) aarch64: bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-0:4.18.0-372.87.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.87.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm 7. References: https://access.redhat.com/security/cve/CVE-2022-0854 https://access.redhat.com/security/cve/CVE-2022-1016 https://access.redhat.com/security/cve/CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-40982 https://access.redhat.com/security/cve/CVE-2022-41218 https://access.redhat.com/security/cve/CVE-2022-41858 https://access.redhat.com/security/cve/CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-1073 https://access.redhat.com/security/cve/CVE-2023-1079 https://access.redhat.com/security/cve/CVE-2023-1192 https://access.redhat.com/security/cve/CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1382 https://access.redhat.com/security/cve/CVE-2023-1838 https://access.redhat.com/security/cve/CVE-2023-1855 https://access.redhat.com/security/cve/CVE-2023-1998 https://access.redhat.com/security/cve/CVE-2023-2162 https://access.redhat.com/security/cve/CVE-2023-2163 https://access.redhat.com/security/cve/CVE-2023-2194 https://access.redhat.com/security/cve/CVE-2023-2513 https://access.redhat.com/security/cve/CVE-2023-3161 https://access.redhat.com/security/cve/CVE-2023-3268 https://access.redhat.com/security/cve/CVE-2023-3567 https://access.redhat.com/security/cve/CVE-2023-3611 https://access.redhat.com/security/cve/CVE-2023-3772 https://access.redhat.com/security/cve/CVE-2023-3812 https://access.redhat.com/security/cve/CVE-2023-4459 https://access.redhat.com/security/cve/CVE-2023-4622 https://access.redhat.com/security/cve/CVE-2023-4623 https://access.redhat.com/security/cve/CVE-2023-4732 https://access.redhat.com/security/cve/CVE-2023-5178 https://access.redhat.com/security/cve/CVE-2023-23454 https://access.redhat.com/security/cve/CVE-2023-26545 https://access.redhat.com/security/cve/CVE-2023-31436 https://access.redhat.com/security/cve/CVE-2023-33203 https://access.redhat.com/security/cve/CVE-2023-35823 https://access.redhat.com/security/cve/CVE-2023-35824 https://access.redhat.com/security/cve/CVE-2023-38409 https://access.redhat.com/security/cve/CVE-2023-42753 https://access.redhat.com/security/cve/CVE-2023-45871 https://access.redhat.com/security/cve/CVE-2024-0562 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/solutions/7027704 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZbcSR8kNZI30y1K9AQiW1hAAmRot7ZiVjtFqBXP+cUb3OERLQuQUGn2m JBzi9BXIWwOvQvHygNfR88QaKeIG2eMKDchhPG5G34/ISyL/BMA/BfztC0UA/Mw+ qFRBogyWh7UbHLs6eVMwBKzYSCsVgcm9Lo0sNS7fjdBDyGAWeYYaw04hEkXulUQp jXko36r/OPUWDg8C9Ug6oIIr5hEbulza4tv4w2jp4lq9E2bEf70Y/t1KqcH0GxWl zf4HqsVvQUFxXimZgmjb2Y7OfQFXsAjCvpuASwgacuGkG4B6tlid1c2qCDwM/ymn /tUF28o5zyoqy1iYaKx4FrFCyXZL4QOUIkf4E33esETJejCWFHTrKRoTk7YgXkDv KSlcrG8/FV6zpMBvumnmv5Ux7KVkrzIxyX1ahgGmOZR6qDFmxC9BCgAVGgM1MLGP 61Kp2h8ij9vvrIp1dtSjatgw2DjMBA46HXxzjlber/JnviyOqB4LFMW1s1RC0vGk /8ZZ500OTNoP2+CMA8urSwlN1HT4X5Zabc+YEbZ4C+xvo7PBBxpqqRL/XEMEJ1iQ d6ryK3058rMy826UnkBfGIpn+tgMYrAlEKvK2Aoa3KteWPYNdVAFrbv5GjuaP0rc O4V2vQSt6zbM7GpaMAw663YBeVvf6B2LDECO2kPgUD5KTgGvcYCSgU4LSDlK1s1X gACv1HF5DN8= =QfXW -----END PGP SIGNATURE-----