Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2024.0823 kernel security and bug fix update 8 February 2024 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: kernel Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2024-0646 CVE-2023-46813 CVE-2023-45862 CVE-2023-40283 CVE-2023-35825 CVE-2023-28772 CVE-2023-28328 CVE-2023-23455 CVE-2023-20569 CVE-2023-6932 CVE-2023-6817 CVE-2023-6610 CVE-2023-6536 CVE-2023-6535 CVE-2023-6356 CVE-2023-5717 CVE-2023-4921 CVE-2023-4132 CVE-2023-3141 CVE-2023-2176 CVE-2023-2166 CVE-2023-1989 CVE-2023-1252 CVE-2023-1075 CVE-2023-0458 CVE-2022-45887 CVE-2022-39189 CVE-2022-36946 CVE-2022-28893 CVE-2022-28390 CVE-2022-28388 CVE-2022-25265 CVE-2022-24448 CVE-2022-23222 CVE-2022-21499 CVE-2022-3707 CVE-2022-3623 CVE-2022-3619 CVE-2022-3594 CVE-2022-3566 CVE-2022-3545 CVE-2022-3524 CVE-2022-2663 CVE-2022-2586 CVE-2022-2078 CVE-2022-1462 CVE-2022-0617 CVE-2022-0500 CVE-2022-0168 CVE-2021-34866 CVE-2021-30002 CVE-2021-4204 CVE-2021-3640 Original Bulletin: https://access.redhat.com/errata/RHSA-2024:0724 Comment: CVSS (Max): 7.8 CVE-2023-6932 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2024:0724 Product: Red Hat Enterprise Linux BaseOS EUS (v.8.6) Advisory URL: https://access.redhat.com/errata/RHSA-2024:0724 Issue date: 2024-02-07 CVE Names: CVE-2021-3640 CVE-2021-4204 CVE-2021-30002 CVE-2021-34866 CVE-2022-0168 CVE-2022-0500 CVE-2022-0617 CVE-2022-1462 CVE-2022-2078 CVE-2022-2586 CVE-2022-2663 CVE-2022-3524 CVE-2022-3545 CVE-2022-3566 CVE-2022-3594 CVE-2022-3619 CVE-2022-3623 CVE-2022-3707 CVE-2022-21499 CVE-2022-23222 CVE-2022-24448 CVE-2022-25265 CVE-2022-28388 CVE-2022-28390 CVE-2022-28893 CVE-2022-36946 CVE-2022-39189 CVE-2022-45887 CVE-2023-0458 CVE-2023-1075 CVE-2023-1252 CVE-2023-1989 CVE-2023-2166 CVE-2023-2176 CVE-2023-3141 CVE-2023-4132 CVE-2023-4921 CVE-2023-5717 CVE-2023-6356 CVE-2023-6535 CVE-2023-6536 CVE-2023-6610 CVE-2023-6817 CVE-2023-6932 CVE-2023-20569 CVE-2023-23455 CVE-2023-28328 CVE-2023-28772 CVE-2023-35825 CVE-2023-40283 CVE-2023-45862 CVE-2023-46813 CVE-2024-0646 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS EUS (v.8.6) - ppc64le, x86_64, s390x, noarch, aarch64 Red Hat Virtualization 4 Hypervisor for RHEL 8 - ppc64le, x86_64, s390x, noarch, aarch64 Red Hat CodeReady Linux Builder EUS (v.8.6) - ppc64le, x86_64, s390x, noarch, aarch64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921) * kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817) * kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646) * kernel: use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * kernel: improper input validation may lead to privilege escalation (CVE-2021-4204) * kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * kernel: eBPF verification flaw (CVE-2021-34866) * kernel: smb2_ioctl_query_info NULL pointer dereference (CVE-2022-0168) * kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges (CVE-2022-0500) * kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * kernel: possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * kernel: buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * kernel: netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * kernel: memory leak in ipv6_renew_options() (CVE-2022-3524) * kernel: nfp: use-after-free in area_cache_get() (CVE-2022-3545) * kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594) * kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * kernel: possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * kernel: local privileges escalation in kernel/bpf/verifier.c (CVE-2022-23222) * kernel: Executable Space Protection Bypass (CVE-2022-25265) * kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c (CVE-2022-28388) * kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1980646 - CVE-2021-3640 - kernel: use-after-free vulnerability in function sco_sock_sendmsg() 2039178 - CVE-2021-4204 - kernel: improper input validation may lead to privilege escalation 1946279 - CVE-2021-30002 - kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c 2000457 - CVE-2021-34866 - kernel: eBPF verification flaw 2037386 - CVE-2022-0168 - kernel: smb2_ioctl_query_info NULL pointer dereference 2044578 - CVE-2022-0500 - kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges 2053632 - CVE-2022-0617 - kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback 2078466 - CVE-2022-1462 - kernel: possible race condition in drivers/tty/tty_buffers.c 2096178 - CVE-2022-2078 - kernel: buffer overflow in nft_set_desc_concat_parse() 2114878 - CVE-2022-2586 - kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation 2123056 - CVE-2022-2663 - kernel: netfilter: nf_conntrack_irc message handling issue 2150947 - CVE-2022-3524 - kernel: memory leak in ipv6_renew_options() 2161310 - CVE-2022-3545 - kernel: nfp: use-after-free in area_cache_get() 2143893 - CVE-2022-3566 - kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt 2149024 - CVE-2022-3594 - kernel: Rate limit overflow messages in r8152 in intr_callback 2154235 - CVE-2022-3619 - kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c 2165721 - CVE-2022-3623 - kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry 2137979 - CVE-2022-3707 - kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed 2084183 - CVE-2022-21499 - kernel: possible to use the debugger to write zero into a location of choice 2043520 - CVE-2022-23222 - kernel: local privileges escalation in kernel/bpf/verifier.c 2051444 - CVE-2022-24448 - kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR 2055499 - CVE-2022-25265 - kernel: Executable Space Protection Bypass 2073091 - CVE-2022-28388 - kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c 2073064 - CVE-2022-28390 - kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c 2074208 - CVE-2022-28893 - kernel: use after free in SUNRPC subsystem 2115278 - CVE-2022-36946 - kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c 2124788 - CVE-2022-39189 - kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning 2148520 - CVE-2022-45887 - kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c 2193219 - CVE-2023-0458 - kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c 2173434 - CVE-2023-1075 - kernel: net/tls: tls_is_tx_ready() checked list_entry 2176140 - CVE-2023-1252 - kernel: ovl: fix use after free in struct ovl_aio_req 2185945 - CVE-2023-1989 - kernel: Use after free bug in btsdio_remove due to race condition 2187813 - CVE-2023-2166 - kernel: NULL pointer dereference in can_rcv_filter 2187931 - CVE-2023-2176 - kernel: Slab-out-of-bound read in compare_netdev_and_ip 2213199 - CVE-2023-3141 - kernel: Use after free bug in r592_remove 2221707 - CVE-2023-4132 - kernel: smsusb: use-after-free caused by do_submit_urb() 2245514 - CVE-2023-4921 - kernel: use-after-free in sch_qfq network scheduler 2246945 - CVE-2023-5717 - kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list 2254054 - CVE-2023-6356 - kernel: NULL pointer dereference in nvmet_tcp_build_iovec 2254053 - CVE-2023-6535 - kernel: NULL pointer dereference in nvmet_tcp_execute_request 2254052 - CVE-2023-6536 - kernel: NULL pointer dereference in __nvmet_req_complete 2253614 - CVE-2023-6610 - kernel: OOB Access in smb2_dump_detail 2255139 - CVE-2023-6817 - kernel: inactive elements in nft_pipapo_walk 2255283 - CVE-2023-6932 - kernel: use-after-free in IPv4 IGMP 2207625 - CVE-2023-20569 - hw amd: Return Address Predictor vulnerability leading to information disclosure 2168332 - CVE-2023-23455 - Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion 2177389 - CVE-2023-28328 - kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c 2181330 - CVE-2023-28772 - kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow 2215837 - CVE-2023-35825 - kernel: r592: race condition leading to use-after- free in r592_remove() 2231800 - CVE-2023-40283 - kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c 2244715 - CVE-2023-45862 - kernel: drivers/usb/storage/ene_ub6250.c 2246944 - CVE-2023-46813 - kernel: SEV-ES local priv escalation 2253908 - CVE-2024-0646 - kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.6) aarch64: bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.91.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm Red Hat Virtualization 4 Hypervisor for RHEL 8 aarch64: bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.91.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm Red Hat CodeReady Linux Builder EUS (v.8.6) aarch64: bpftool-0:4.18.0-372.91.1.el8_6.aarch64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.aarch64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.aarch64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.aarch64.rpm ppc64le: bpftool-0:4.18.0-372.91.1.el8_6.ppc64le.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-0:4.18.0-372.91.1.el8_6.ppc64le.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.ppc64le.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.ppc64le.rpm s390x: bpftool-0:4.18.0-372.91.1.el8_6.s390x.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-core-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-devel-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-0:4.18.0-372.91.1.el8_6.s390x.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-0:4.18.0-372.91.1.el8_6.s390x.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.s390x.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.s390x.rpm x86_64: bpftool-0:4.18.0-372.91.1.el8_6.x86_64.rpm bpftool-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-cross-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-core-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debug-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-modules-extra-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-tools-libs-devel-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-0:4.18.0-372.91.1.el8_6.x86_64.rpm python3-perf-debuginfo-0:4.18.0-372.91.1.el8_6.x86_64.rpm kernel-headers-0:4.18.0-372.91.1.el8_6.x86_64.rpm Source: kernel-0:4.18.0-372.91.1.el8_6.src.rpm noarch: kernel-abi-stablelists-0:4.18.0-372.91.1.el8_6.noarch.rpm kernel-doc-0:4.18.0-372.91.1.el8_6.noarch.rpm 7. References: https://access.redhat.com/security/cve/CVE-2021-3640 https://access.redhat.com/security/cve/CVE-2021-4204 https://access.redhat.com/security/cve/CVE-2021-30002 https://access.redhat.com/security/cve/CVE-2021-34866 https://access.redhat.com/security/cve/CVE-2022-0168 https://access.redhat.com/security/cve/CVE-2022-0500 https://access.redhat.com/security/cve/CVE-2022-0617 https://access.redhat.com/security/cve/CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-2078 https://access.redhat.com/security/cve/CVE-2022-2586 https://access.redhat.com/security/cve/CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3545 https://access.redhat.com/security/cve/CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3594 https://access.redhat.com/security/cve/CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-21499 https://access.redhat.com/security/cve/CVE-2022-23222 https://access.redhat.com/security/cve/CVE-2022-24448 https://access.redhat.com/security/cve/CVE-2022-25265 https://access.redhat.com/security/cve/CVE-2022-28388 https://access.redhat.com/security/cve/CVE-2022-28390 https://access.redhat.com/security/cve/CVE-2022-28893 https://access.redhat.com/security/cve/CVE-2022-36946 https://access.redhat.com/security/cve/CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-45887 https://access.redhat.com/security/cve/CVE-2023-0458 https://access.redhat.com/security/cve/CVE-2023-1075 https://access.redhat.com/security/cve/CVE-2023-1252 https://access.redhat.com/security/cve/CVE-2023-1989 https://access.redhat.com/security/cve/CVE-2023-2166 https://access.redhat.com/security/cve/CVE-2023-2176 https://access.redhat.com/security/cve/CVE-2023-3141 https://access.redhat.com/security/cve/CVE-2023-4132 https://access.redhat.com/security/cve/CVE-2023-4921 https://access.redhat.com/security/cve/CVE-2023-5717 https://access.redhat.com/security/cve/CVE-2023-6356 https://access.redhat.com/security/cve/CVE-2023-6535 https://access.redhat.com/security/cve/CVE-2023-6536 https://access.redhat.com/security/cve/CVE-2023-6610 https://access.redhat.com/security/cve/CVE-2023-6817 https://access.redhat.com/security/cve/CVE-2023-6932 https://access.redhat.com/security/cve/CVE-2023-20569 https://access.redhat.com/security/cve/CVE-2023-23455 https://access.redhat.com/security/cve/CVE-2023-28328 https://access.redhat.com/security/cve/CVE-2023-28772 https://access.redhat.com/security/cve/CVE-2023-35825 https://access.redhat.com/security/cve/CVE-2023-40283 https://access.redhat.com/security/cve/CVE-2023-45862 https://access.redhat.com/security/cve/CVE-2023-46813 https://access.redhat.com/security/cve/CVE-2024-0646 https://access.redhat.com/security/updates/classification/#important - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZcQiV8kNZI30y1K9AQidGhAAuCPPkvoYp4Sdrfq0UMCKbXFpBuTyGEKz Hz1T4q/Ur0Vj+tHM1wkNkB35bFp2j5JYSdCR+gECWyOOtXkB8Saz3DGHXq4V4o1f GpmdXgww/yUZfzynjRi+hNxF8D0W1WjKPPco6sfa0TPEWPjv9pK7TI9J07Pi3QK+ sZs/SrDJuW9Jr7APVZJS7pp3paQSDksOuMyQbFqSrPMLcZghhhDsjCor2eZzpaoZ GkY9FMuXpjIrsXQqhUZvdlgCHoqUTDYyVQNl22UngSiw/F4+AtTBUi69giCLW5eC LXnr9IZJVFdvyao2w27diipEbQ7UQIttemuU7Uw5spoG5MIhM/Cgsq9DdfJ0XULi F5uBQVCo9xv8J3Pl0I7aS68tw9TuZ6EnGLfGTPM9+ysKUyRiUOAspL9XvCcpYp8u UccL0a8538xA7KZZ48z02TDM9yHIEU7b7mokM+Q2Lgo/CCx65DSDUrarxTyU/BEs SrbpHk+ORisO37J4Bhcv0WCxbzFwjFbPifQ9u6iBw0On6SttGPTBsNu96Tg8fxY7 m3FWm2AAJp4AK+XRe5LrkPOcY8OXqRGoJVJK4rq99EF9jEAeDsidPr2UzPa8Sgs6 6O9U/NIvR5wTsXgdJM55OBt7hvYHCEw2FoHo0+nE3gikhiWmldWUMjqoH2VsOPks 79H+w7SYZzE= =AlFQ -----END PGP SIGNATURE-----