-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2024.0823
                    kernel security and bug fix update
                              8 February 2024

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2024-0646 CVE-2023-46813 CVE-2023-45862
                   CVE-2023-40283 CVE-2023-35825 CVE-2023-28772
                   CVE-2023-28328 CVE-2023-23455 CVE-2023-20569
                   CVE-2023-6932 CVE-2023-6817 CVE-2023-6610
                   CVE-2023-6536 CVE-2023-6535 CVE-2023-6356
                   CVE-2023-5717 CVE-2023-4921 CVE-2023-4132
                   CVE-2023-3141 CVE-2023-2176 CVE-2023-2166
                   CVE-2023-1989 CVE-2023-1252 CVE-2023-1075
                   CVE-2023-0458 CVE-2022-45887 CVE-2022-39189
                   CVE-2022-36946 CVE-2022-28893 CVE-2022-28390
                   CVE-2022-28388 CVE-2022-25265 CVE-2022-24448
                   CVE-2022-23222 CVE-2022-21499 CVE-2022-3707
                   CVE-2022-3623 CVE-2022-3619 CVE-2022-3594
                   CVE-2022-3566 CVE-2022-3545 CVE-2022-3524
                   CVE-2022-2663 CVE-2022-2586 CVE-2022-2078
                   CVE-2022-1462 CVE-2022-0617 CVE-2022-0500
                   CVE-2022-0168 CVE-2021-34866 CVE-2021-30002
                   CVE-2021-4204 CVE-2021-3640 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2024:0724

Comment: CVSS (Max):  7.8 CVE-2023-6932 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

=====================================================================
                Red Hat Security Advisory

Synopsis:          Important: kernel security and bug fix update
Advisory ID:       RHSA-2024:0724
Product:           Red Hat Enterprise Linux BaseOS EUS (v.8.6)
Advisory URL:      https://access.redhat.com/errata/RHSA-2024:0724
Issue date:        2024-02-07
CVE Names:         CVE-2021-3640 CVE-2021-4204 CVE-2021-30002 CVE-2021-34866
                   CVE-2022-0168 CVE-2022-0500 CVE-2022-0617 CVE-2022-1462
                   CVE-2022-2078 CVE-2022-2586 CVE-2022-2663 CVE-2022-3524
                   CVE-2022-3545 CVE-2022-3566 CVE-2022-3594 CVE-2022-3619
                   CVE-2022-3623 CVE-2022-3707 CVE-2022-21499 CVE-2022-23222
                   CVE-2022-24448 CVE-2022-25265 CVE-2022-28388 CVE-2022-28390
                   CVE-2022-28893 CVE-2022-36946 CVE-2022-39189 CVE-2022-45887
                   CVE-2023-0458 CVE-2023-1075 CVE-2023-1252 CVE-2023-1989
                   CVE-2023-2166 CVE-2023-2176 CVE-2023-3141 CVE-2023-4132
                   CVE-2023-4921 CVE-2023-5717 CVE-2023-6356 CVE-2023-6535
                   CVE-2023-6536 CVE-2023-6610 CVE-2023-6817 CVE-2023-6932
                   CVE-2023-20569 CVE-2023-23455 CVE-2023-28328 CVE-2023-28772
                   CVE-2023-35825 CVE-2023-40283 CVE-2023-45862 CVE-2023-46813
                   CVE-2024-0646
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v.8.6) - ppc64le, x86_64, s390x, noarch,
aarch64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - ppc64le, x86_64, s390x, noarch,
aarch64
Red Hat CodeReady Linux Builder EUS (v.8.6) - ppc64le, x86_64, s390x, noarch,
aarch64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921)

* kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817)

* kernel: ktls overwrites readonly memory pages when using function splice with
a ktls socket as destination (CVE-2024-0646)

* kernel: use-after-free vulnerability in function sco_sock_sendmsg()
(CVE-2021-3640)

* kernel: improper input validation may lead to privilege escalation
(CVE-2021-4204)

* kernel: memory leak for large arguments in video_usercopy function in
drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)

* kernel: eBPF verification flaw (CVE-2021-34866)

* kernel: smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168)

* kernel: Linux ebpf logic vulnerability leads to critical memory read and write
gaining root privileges (CVE-2022-0500)

* kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during
writeback (CVE-2022-0617)

* kernel: possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462)

* kernel: buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)

* kernel: nf_tables cross-table potential use-after-free may lead to local
privilege escalation (CVE-2022-2586)

* kernel: netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663)

* kernel: memory leak in ipv6_renew_options() (CVE-2022-3524)

* kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545)

* kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
(CVE-2022-3566)

* kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594)

* kernel: memory leak in l2cap_recv_acldata of the file
net/bluetooth/l2cap_core.c (CVE-2022-3619)

* kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte
entry (CVE-2022-3623)

* kernel: Double-free in split_2MB_gtt_entry when function
intel_gvt_dma_map_guest_page failed (CVE-2022-3707)

* kernel: possible to use the debugger to write zero into a location of choice
(CVE-2022-21499)

* kernel: local privileges escalation in kernel/bpf/verifier.c (CVE-2022-23222)

* kernel: Executable Space Protection Bypass (CVE-2022-25265)

* kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c
(CVE-2022-28388)

* kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
(CVE-2022-28390)

4. Solution:

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1980646 - CVE-2021-3640 - kernel: use-after-free vulnerability in function
sco_sock_sendmsg()
2039178 - CVE-2021-4204 - kernel: improper input validation may lead to
privilege escalation
1946279 - CVE-2021-30002 - kernel: memory leak for large arguments in
video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c
2000457 - CVE-2021-34866 - kernel: eBPF verification flaw 
2037386 - CVE-2022-0168 - kernel: smb2_ioctl_query_info NULL pointer dereference
2044578 - CVE-2022-0500 - kernel: Linux ebpf logic vulnerability leads to
critical memory read and write gaining root privileges
2053632 - CVE-2022-0617 - kernel: NULL pointer dereference in
udf_expand_file_adinicbdue() during writeback
2078466 - CVE-2022-1462 - kernel: possible race condition in
drivers/tty/tty_buffers.c
2096178 - CVE-2022-2078 - kernel: buffer overflow in nft_set_desc_concat_parse()
2114878 - CVE-2022-2586 - kernel: nf_tables cross-table potential use-after-free
may lead to local privilege escalation
2123056 - CVE-2022-2663 - kernel: netfilter: nf_conntrack_irc message handling
issue
2150947 - CVE-2022-3524 - kernel: memory leak in ipv6_renew_options() 
2161310 - CVE-2022-3545 - kernel: nfp: use-after-free in area_cache_get() 
2143893 - CVE-2022-3566 - kernel: data races around icsk->icsk_af_ops in
do_ipv6_setsockopt
2149024 - CVE-2022-3594 - kernel: Rate limit overflow messages in r8152 in
intr_callback
2154235 - CVE-2022-3619 - kernel: memory leak in l2cap_recv_acldata of the file
net/bluetooth/l2cap_core.c
2165721 - CVE-2022-3623 - kernel: denial of service in follow_page_pte in
mm/gup.c due to poisoned pte entry
2137979 - CVE-2022-3707 - kernel: Double-free in split_2MB_gtt_entry when
function intel_gvt_dma_map_guest_page failed
2084183 - CVE-2022-21499 - kernel: possible to use the debugger to write zero
into a location of choice
2043520 - CVE-2022-23222 - kernel: local privileges escalation in
kernel/bpf/verifier.c
2051444 - CVE-2022-24448 - kernel: nfs_atomic_open() returns uninitialized data
instead of ENOTDIR
2055499 - CVE-2022-25265 - kernel: Executable Space Protection Bypass 
2073091 - CVE-2022-28388 - kernel: double free in usb_8dev_start_xmit in
drivers/net/can/usb/usb_8dev.c
2073064 - CVE-2022-28390 - kernel: double free in ems_usb_start_xmit in
drivers/net/can/usb/ems_usb.c
2074208 - CVE-2022-28893 - kernel: use after free in SUNRPC subsystem 
2115278 - CVE-2022-36946 - kernel: DoS in nfqnl_mangle in
net/netfilter/nfnetlink_queue.c
2124788 - CVE-2022-39189 - kernel: TLB flush operations are mishandled in
certain KVM_VCPU_PREEMPTED leading to guest malfunctioning
2148520 - CVE-2022-45887 - kernel: memory leak in ttusb_dec_exit_dvb() in
media/usb/ttusb-dec/ttusb_dec.c
2193219 - CVE-2023-0458 - kernel: speculative pointer dereference in
do_prlimit() in kernel/sys.c
2173434 - CVE-2023-1075 - kernel: net/tls: tls_is_tx_ready() checked list_entry 
2176140 - CVE-2023-1252 - kernel: ovl: fix use after free in struct ovl_aio_req 
2185945 - CVE-2023-1989 - kernel: Use after free bug in btsdio_remove due to
race condition
2187813 - CVE-2023-2166 - kernel: NULL pointer dereference in can_rcv_filter 
2187931 - CVE-2023-2176 - kernel: Slab-out-of-bound read in
compare_netdev_and_ip
2213199 - CVE-2023-3141 - kernel: Use after free bug in r592_remove 
2221707 - CVE-2023-4132 - kernel: smsusb: use-after-free caused by
do_submit_urb()
2245514 - CVE-2023-4921 - kernel: use-after-free in sch_qfq network scheduler 
2246945 - CVE-2023-5717 - kernel: A heap out-of-bounds write when function
perf_read_group is called and sibling_list is smaller than its child's
sibling_list
2254054 - CVE-2023-6356 - kernel: NULL pointer dereference in
nvmet_tcp_build_iovec
2254053 - CVE-2023-6535 - kernel: NULL pointer dereference in
nvmet_tcp_execute_request
2254052 - CVE-2023-6536 - kernel: NULL pointer dereference in
__nvmet_req_complete
2253614 - CVE-2023-6610 - kernel: OOB Access in smb2_dump_detail 
2255139 - CVE-2023-6817 - kernel: inactive elements in nft_pipapo_walk 
2255283 - CVE-2023-6932 - kernel: use-after-free in IPv4 IGMP 
2207625 - CVE-2023-20569 - hw amd: Return Address Predictor vulnerability
leading to information disclosure
2168332 - CVE-2023-23455 - Kernel: denial of service in atm_tc_enqueue in
net/sched/sch_atm.c due to type confusion
2177389 - CVE-2023-28328 - kernel: Denial of service issue in az6027 driver in
drivers/media/usb/dev-usb/az6027.c
2181330 - CVE-2023-28772 - kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer
overflow
2215837 - CVE-2023-35825 - kernel: r592: race condition leading to use-after-
free in r592_remove()
2231800 - CVE-2023-40283 - kernel: use-after-free in l2cap_sock_release in
net/bluetooth/l2cap_sock.c
2244715 - CVE-2023-45862 - kernel: drivers/usb/storage/ene_ub6250.c 
2246944 - CVE-2023-46813 - kernel: SEV-ES local priv escalation 
2253908 - CVE-2024-0646 - kernel: ktls overwrites readonly memory pages when
using function splice with a ktls socket as destination

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v.8.6)

aarch64:
bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.91.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8

aarch64:
bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.91.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm

Red Hat CodeReady Linux Builder EUS (v.8.6)

aarch64:
bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm

s390x:
bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm

x86_64:
bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm
bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm
kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm

Source:
kernel-0:4.18.0-372.91.1.el8_6.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm
kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm

7. References:

https://access.redhat.com/security/cve/CVE-2021-3640
https://access.redhat.com/security/cve/CVE-2021-4204
https://access.redhat.com/security/cve/CVE-2021-30002
https://access.redhat.com/security/cve/CVE-2021-34866
https://access.redhat.com/security/cve/CVE-2022-0168
https://access.redhat.com/security/cve/CVE-2022-0500
https://access.redhat.com/security/cve/CVE-2022-0617
https://access.redhat.com/security/cve/CVE-2022-1462
https://access.redhat.com/security/cve/CVE-2022-2078
https://access.redhat.com/security/cve/CVE-2022-2586
https://access.redhat.com/security/cve/CVE-2022-2663
https://access.redhat.com/security/cve/CVE-2022-3524
https://access.redhat.com/security/cve/CVE-2022-3545
https://access.redhat.com/security/cve/CVE-2022-3566
https://access.redhat.com/security/cve/CVE-2022-3594
https://access.redhat.com/security/cve/CVE-2022-3619
https://access.redhat.com/security/cve/CVE-2022-3623
https://access.redhat.com/security/cve/CVE-2022-3707
https://access.redhat.com/security/cve/CVE-2022-21499
https://access.redhat.com/security/cve/CVE-2022-23222
https://access.redhat.com/security/cve/CVE-2022-24448
https://access.redhat.com/security/cve/CVE-2022-25265
https://access.redhat.com/security/cve/CVE-2022-28388
https://access.redhat.com/security/cve/CVE-2022-28390
https://access.redhat.com/security/cve/CVE-2022-28893
https://access.redhat.com/security/cve/CVE-2022-36946
https://access.redhat.com/security/cve/CVE-2022-39189
https://access.redhat.com/security/cve/CVE-2022-45887
https://access.redhat.com/security/cve/CVE-2023-0458
https://access.redhat.com/security/cve/CVE-2023-1075
https://access.redhat.com/security/cve/CVE-2023-1252
https://access.redhat.com/security/cve/CVE-2023-1989
https://access.redhat.com/security/cve/CVE-2023-2166
https://access.redhat.com/security/cve/CVE-2023-2176
https://access.redhat.com/security/cve/CVE-2023-3141
https://access.redhat.com/security/cve/CVE-2023-4132
https://access.redhat.com/security/cve/CVE-2023-4921
https://access.redhat.com/security/cve/CVE-2023-5717
https://access.redhat.com/security/cve/CVE-2023-6356
https://access.redhat.com/security/cve/CVE-2023-6535
https://access.redhat.com/security/cve/CVE-2023-6536
https://access.redhat.com/security/cve/CVE-2023-6610
https://access.redhat.com/security/cve/CVE-2023-6817
https://access.redhat.com/security/cve/CVE-2023-6932
https://access.redhat.com/security/cve/CVE-2023-20569
https://access.redhat.com/security/cve/CVE-2023-23455
https://access.redhat.com/security/cve/CVE-2023-28328
https://access.redhat.com/security/cve/CVE-2023-28772
https://access.redhat.com/security/cve/CVE-2023-35825
https://access.redhat.com/security/cve/CVE-2023-40283
https://access.redhat.com/security/cve/CVE-2023-45862
https://access.redhat.com/security/cve/CVE-2023-46813
https://access.redhat.com/security/cve/CVE-2024-0646
https://access.redhat.com/security/updates/classification/#important

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=AlFQ
-----END PGP SIGNATURE-----