-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2024.0557
                    kernel security and bug fix update
                              29 January 2024

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2024-0562 CVE-2023-45871 CVE-2023-42753
                   CVE-2023-38409 CVE-2023-35824 CVE-2023-35823
                   CVE-2023-33203 CVE-2023-31436 CVE-2023-26545
                   CVE-2023-23454 CVE-2023-5178 CVE-2023-4732
                   CVE-2023-4623 CVE-2023-4622 CVE-2023-4459
                   CVE-2023-3812 CVE-2023-3772 CVE-2023-3611
                   CVE-2023-3567 CVE-2023-3268 CVE-2023-3161
                   CVE-2023-2513 CVE-2023-2194 CVE-2023-2163
                   CVE-2023-2162 CVE-2023-1998 CVE-2023-1855
                   CVE-2023-1838 CVE-2023-1382 CVE-2023-1195
                   CVE-2023-1192 CVE-2023-1079 CVE-2023-1073
                   CVE-2023-0394 CVE-2022-47929 CVE-2022-43750
                   CVE-2022-41858 CVE-2022-41218 CVE-2022-40982
                   CVE-2022-30594 CVE-2022-20141 CVE-2022-4129
                   CVE-2022-3628 CVE-2022-3567 CVE-2022-3522
                   CVE-2022-3028 CVE-2022-1679 CVE-2022-1016
                   CVE-2022-0854  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2024:0412

Comment: CVSS (Max):  9.8 CVE-2023-5178 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

=====================================================================
                Red Hat Security Advisory

Synopsis:          Important: kernel security and bug fix update
Advisory ID:       RHSA-2024:0412
Product:           Red Hat Enterprise Linux BaseOS EUS (v.8.6)
Advisory URL:      https://access.redhat.com/errata/RHSA-2024:0412
Issue date:        2024-01-25
CVE Names:         CVE-2022-0854 CVE-2022-1016 CVE-2022-1679 CVE-2022-3028
                   CVE-2022-3522 CVE-2022-3567 CVE-2022-3628 CVE-2022-4129
                   CVE-2022-20141 CVE-2022-30594 CVE-2022-40982 CVE-2022-41218
                   CVE-2022-41858 CVE-2022-43750 CVE-2022-47929 CVE-2023-0394
                   CVE-2023-1073 CVE-2023-1079 CVE-2023-1192 CVE-2023-1195
                   CVE-2023-1382 CVE-2023-1838 CVE-2023-1855 CVE-2023-1998
                   CVE-2023-2162 CVE-2023-2163 CVE-2023-2194 CVE-2023-2513
                   CVE-2023-3161 CVE-2023-3268 CVE-2023-3567 CVE-2023-3611
                   CVE-2023-3772 CVE-2023-3812 CVE-2023-4459 CVE-2023-4622
                   CVE-2023-4623 CVE-2023-4732 CVE-2023-5178 CVE-2023-23454
                   CVE-2023-26545 CVE-2023-31436 CVE-2023-33203 CVE-2023-35823
                   CVE-2023-35824 CVE-2023-38409 CVE-2023-42753 CVE-2023-45871
                   CVE-2024-0562
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x,
noarch
Red Hat Virtualization 4 Hypervisor for RHEL 8 - aarch64, ppc64le, x86_64,
s390x, noarch
Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64, s390x,
noarch

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being
incorrectly marked as safe (CVE-2023-2163)

* kernel: net/sched: multiple vulnerabilities (CVE-2023-3611, CVE-2023-4623)

* kernel: tun: bugs for oversize packet when napi frags enabled in
tun_napi_alloc_frags (CVE-2023-3812)

* kernel: use after free in unix_stream_sendpage (CVE-2023-4622)

* kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)

* kernel: out-of-bounds write in qfq_change_class function (CVE-2023-31436)

* kernel: netfilter: potential slab-out-of-bound access due to integer underflow
(CVE-2023-42753)

* kernel: IGB driver inadequate buffer size for frames larger than MTU
(CVE-2023-45871)

* kernel: multiple race condition vulnerabilities (CVE-2022-3028, CVE-2022-3522,
CVE-2023-33203, CVE-2023-35823, CVE-2023-35824, CVE-2022-3567, BZ#2230094)

* kernel: swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)

* kernel: uninitialized registers on stack in nft_do_chain can cause kernel
pointer leakage to UM (CVE-2022-1016)

* kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation
of privileges (CVE-2022-1679)

* kernel: USB-accessible buffer overflow in brcmfmac (CVE-2022-3628)

* kernel: multiple NULL pointer dereference vulnerabilities (CVE-2022-4129,
CVE-2022-47929, CVE-2023-0394, CVE-2023-3772, CVE-2023-4459)

* kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet
sockets (CVE-2022-20141)

* kernel: Unprivileged users may use PTRACE_SEIZE to set
PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)

* hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
(CVE-2022-40982)

* kernel: Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218)

* kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip
(CVE-2022-41858)

* kernel: memory corruption in usbmon driver (CVE-2022-43750)

* kernel: HID: multiple vulnerabilities (CVE-2023-1073, CVE-2023-1079)

* kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c
(CVE-2023-1195)

* kernel: denial of service in tipc_conn_close (CVE-2023-1382)

* kernel: Possible use-after-free since the two fdget() during
vhost_net_set_backend() (CVE-2023-1838)

* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)

* Kernel: UAF during login when accessing the shost ipaddress (CVE-2023-2162)

* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)

* kernel: ext4: use-after-free in ext4_xattr_set_entry() (CVE-2023-2513)

* kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161)

* kernel: out-of-bounds access in relay_file_read (CVE-2023-3268)

* kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race
(CVE-2023-3567)

* kernel: Race between task migrating pages and another task calling exit_mmap
(CVE-2023-4732)

* kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
(CVE-2023-23454)

* kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545)

* kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong
con2fb_map assignment (CVE-2023-38409)

* kernel: use-after-free after removing device in wb_inode_writeback_end in
mm/page-writeback.c (CVE-2024-0562)

* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)

* kernel: use-after-free bug in remove function xgene_hwmon_remove
(CVE-2023-1855)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Bug Fix(es):

* bpf_jit_limit hit again (BZ#2243013)

* HPE Edgeline 920t resets during kdump context when ice driver is loaded and
when system is booted with intel_iommu=on iommu=pt (BZ#2244627)

* RHEL8.6 - s390/dasd: Use correct lock while counting channel queue length
(BZ#2250882)

4. Solution:

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2058395 - CVE-2022-0854 - kernel: swiotlb information leak with DMA_FROM_DEVICE 
2066614 - CVE-2022-1016 - kernel: uninitialized registers on stack in
nft_do_chain can cause kernel pointer leakage to UM
2084125 - CVE-2022-1679 - kernel: use-after-free in ath9k_htc_probe_device()
could cause an escalation of privileges
2122228 - CVE-2022-3028 - kernel: race condition in xfrm_probe_algs can lead to
OOB read/write
2150979 - CVE-2022-3522 - kernel: race condition in hugetlb_no_page() in
mm/hugetlb.c
2143943 - CVE-2022-3567 - kernel: data races around sk->sk_prot 
2150960 - CVE-2022-3628 - kernel: USB-accessible buffer overflow in brcmfmac 
2134528 - CVE-2022-4129 - kernel: l2tp: missing lock when clearing sk_user_data
can lead to NULL pointer dereference
2114937 - CVE-2022-20141 - kernel: igmp: use-after-free in ip_check_mc_rcu when
opening and closing inet sockets
2085300 - CVE-2022-30594 - kernel: Unprivileged users may use PTRACE_SEIZE to
set PTRACE_O_SUSPEND_SECCOMP option
2223949 - CVE-2022-40982 - hw: Intel: Gather Data Sampling (GDS) side channel
vulnerability
2122960 - CVE-2022-41218 - kernel: Report vmalloc UAF in dvb-core/dmxdev 
2144379 - CVE-2022-41858 - kernel: null-ptr-deref vulnerabilities in
sl_tx_timeout in drivers/net/slip
2151270 - CVE-2022-43750 - kernel: memory corruption in usbmon driver 
2168246 - CVE-2022-47929 - kernel: NULL pointer dereference in traffic control
subsystem
2162120 - CVE-2023-0394 - kernel: NULL pointer dereference in
rawv6_push_pending_frames
2173403 - CVE-2023-1073 - kernel: HID: check empty report_list in
hid_validate_values()
2173444 - CVE-2023-1079 - kernel: hid: Use After Free in asus_remove() 
2154178 - CVE-2023-1192 - kernel: use-after-free in smb2_is_status_io_timeout() 
2154171 - CVE-2023-1195 - kernel: use-after-free caused by invalid pointer
hostname in fs/cifs/connect.c
2177371 - CVE-2023-1382 - kernel: denial of service in tipc_conn_close 
2087568 - CVE-2023-1838 - kernel: Possible use-after-free since the two fdget()
during vhost_net_set_backend()
2184578 - CVE-2023-1855 - kernel: use-after-free bug in remove function
xgene_hwmon_remove
2187257 - CVE-2023-1998 - kernel: Spectre v2 SMT mitigations problem 
2187773 - CVE-2023-2162 - kernel: UAF during login when accessing the shost
ipaddress
2240249 - CVE-2023-2163 - kernel: bpf: Incorrect verifier pruning leads to
unsafe code paths being incorrectly marked as safe
2188396 - CVE-2023-2194 - kernel: i2c: out-of-bounds write in
xgene_slimpro_i2c_xfer()
2193097 - CVE-2023-2513 - kernel: ext4: use-after-free in ext4_xattr_set_entry()
2213485 - CVE-2023-3161 - kernel: fbcon: shift-out-of-bounds in fbcon_set_font()
2215502 - CVE-2023-3268 - kernel: out-of-bounds access in relay_file_read 
2221463 - CVE-2023-3567 - kernel: use after free in vcs_read in
drivers/tty/vt/vc_screen.c due to race
2225191 - CVE-2023-3611 - kernel: net/sched: sch_qfq component can be exploited
if in qfq_change_agg function happens qfq_enqueue overhead
2218943 - CVE-2023-3772 - kernel: xfrm: NULL pointer dereference in
xfrm_update_ae_params()
2224048 - CVE-2023-3812 - kernel: tun: bugs for oversize packet when napi frags
enabled in tun_napi_alloc_frags
2219268 - CVE-2023-4459 - kernel: vmxnet3: NULL pointer dereference in
vmxnet3_rq_cleanup()
2237760 - CVE-2023-4622 - kernel: use after free in unix_stream_sendpage 
2237757 - CVE-2023-4623 - kernel: net/sched: sch_hfsc UAF 
2236982 - CVE-2023-4732 - kernel: Race between task migrating pages and another
task calling exit_mmap to release those same pages getting invalid opcode BUG in
include/linux/swapops.h
2241924 - CVE-2023-5178 - kernel: use after free in nvmet_tcp_free_crypto in
NVMe
2168297 - CVE-2023-23454 - kernel: slab-out-of-bounds read vulnerabilities in
cbq_classify
2182443 - CVE-2023-26545 - kernel: mpls: double free on sysctl allocation
failure
2192671 - CVE-2023-31436 - kernel: out-of-bounds write in qfq_change_class
function
2192667 - CVE-2023-33203 - kernel: net: qcom/emac: race condition leading to
use-after-free in emac_remove()
2215835 - CVE-2023-35823 - kernel: saa7134: race condition leading to use-after-
free in saa7134_finidev()
2215836 - CVE-2023-35824 - kernel: dm1105: race condition leading to use-after-
free in dm1105_remove.c()
2230042 - CVE-2023-38409 - kernel: fbcon: out-of-sync arrays in
fbcon_mode_deleted due to wrong con2fb_map assignment
2239843 - CVE-2023-42753 - kernel: netfilter: potential slab-out-of-bound access
due to integer underflow
2244723 - CVE-2023-45871 - kernel: IGB driver inadequate buffer size for frames
larger than MTU
2258475 - CVE-2024-0562 - kernel: use-after-free after removing device in
wb_inode_writeback_end in mm/page-writeback.c

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v.8.6)

aarch64:
bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.87.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8

aarch64:
bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.87.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm

Red Hat CodeReady Linux Builder EUS (v.8.6)

aarch64:
bpftool-0:4.18.0-372.87.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.87.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.87.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.87.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.87.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.87.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.87.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.87.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.87.1.el8_6.noarch.rpm

7. References:

https://access.redhat.com/security/cve/CVE-2022-0854
https://access.redhat.com/security/cve/CVE-2022-1016
https://access.redhat.com/security/cve/CVE-2022-1679
https://access.redhat.com/security/cve/CVE-2022-3028
https://access.redhat.com/security/cve/CVE-2022-3522
https://access.redhat.com/security/cve/CVE-2022-3567
https://access.redhat.com/security/cve/CVE-2022-3628
https://access.redhat.com/security/cve/CVE-2022-4129
https://access.redhat.com/security/cve/CVE-2022-20141
https://access.redhat.com/security/cve/CVE-2022-30594
https://access.redhat.com/security/cve/CVE-2022-40982
https://access.redhat.com/security/cve/CVE-2022-41218
https://access.redhat.com/security/cve/CVE-2022-41858
https://access.redhat.com/security/cve/CVE-2022-43750
https://access.redhat.com/security/cve/CVE-2022-47929
https://access.redhat.com/security/cve/CVE-2023-0394
https://access.redhat.com/security/cve/CVE-2023-1073
https://access.redhat.com/security/cve/CVE-2023-1079
https://access.redhat.com/security/cve/CVE-2023-1192
https://access.redhat.com/security/cve/CVE-2023-1195
https://access.redhat.com/security/cve/CVE-2023-1382
https://access.redhat.com/security/cve/CVE-2023-1838
https://access.redhat.com/security/cve/CVE-2023-1855
https://access.redhat.com/security/cve/CVE-2023-1998
https://access.redhat.com/security/cve/CVE-2023-2162
https://access.redhat.com/security/cve/CVE-2023-2163
https://access.redhat.com/security/cve/CVE-2023-2194
https://access.redhat.com/security/cve/CVE-2023-2513
https://access.redhat.com/security/cve/CVE-2023-3161
https://access.redhat.com/security/cve/CVE-2023-3268
https://access.redhat.com/security/cve/CVE-2023-3567
https://access.redhat.com/security/cve/CVE-2023-3611
https://access.redhat.com/security/cve/CVE-2023-3772
https://access.redhat.com/security/cve/CVE-2023-3812
https://access.redhat.com/security/cve/CVE-2023-4459
https://access.redhat.com/security/cve/CVE-2023-4622
https://access.redhat.com/security/cve/CVE-2023-4623
https://access.redhat.com/security/cve/CVE-2023-4732
https://access.redhat.com/security/cve/CVE-2023-5178
https://access.redhat.com/security/cve/CVE-2023-23454
https://access.redhat.com/security/cve/CVE-2023-26545
https://access.redhat.com/security/cve/CVE-2023-31436
https://access.redhat.com/security/cve/CVE-2023-33203
https://access.redhat.com/security/cve/CVE-2023-35823
https://access.redhat.com/security/cve/CVE-2023-35824
https://access.redhat.com/security/cve/CVE-2023-38409
https://access.redhat.com/security/cve/CVE-2023-42753
https://access.redhat.com/security/cve/CVE-2023-45871
https://access.redhat.com/security/cve/CVE-2024-0562
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/solutions/7027704

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=QfXW
-----END PGP SIGNATURE-----