-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.7140
             kernel security, bug fix, and enhancement update
                             29 November 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           kernel
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-42753 CVE-2023-38409 CVE-2023-4732
                   CVE-2023-4208 CVE-2023-4207 CVE-2023-4206
                   CVE-2023-4128 CVE-2023-3609 CVE-2023-1192
                   CVE-2022-45919 CVE-2022-45886 CVE-2022-45884
                   CVE-2022-40982  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:7539

Comment: CVSS (Max):  7.8 CVE-2023-4208 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

=====================================================================
                Red Hat Security Advisory

Synopsis:          Important: kernel security, bug fix, and
                   enhancement update
Advisory ID:       RHSA-2023:7539
Product:           Red Hat Enterprise Linux BaseOS EUS (v.8.8)
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:7539
Issue date:        2023-11-28
CVE Names:         CVE-2022-40982 CVE-2022-45884 CVE-2022-45886 CVE-2022-45919
                   CVE-2023-1192 CVE-2023-3609 CVE-2023-4128 CVE-2023-4206
                   CVE-2023-4207 CVE-2023-4208 CVE-2023-4732 CVE-2023-38409
                   CVE-2023-42753
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 8.8 Extended
Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v.8.8) - aarch64, ppc64le, x86_64, s390x,
noarch
Red Hat CodeReady Linux Builder EUS (v.8.8) - aarch64, ppc64le, x86_64, s390x,
noarch

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating
system.

Security Fix(es):

* kernel: net/sched: cls_u32 component reference counter leak if
tcf_change_indev() fails (CVE-2023-3609)

* kernel: net/sched: Use-after-free vulnerabilities in the net/sched
classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206,
CVE-2023-4207, CVE-2023-4208)

* kernel: netfilter: potential slab-out-of-bound access due to integer underflow
(CVE-2023-42753)

* hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
(CVE-2022-40982)

* kernel: use-after-free due to race condition occurring in
dvb_register_device() (CVE-2022-45884)

* kernel: use-after-free due to race condition occurring in dvb_net.c
(CVE-2022-45886)

* kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c
(CVE-2022-45919)

* kernel: Race between task migrating pages and another task calling exit_mmap
to release those same pages getting invalid opcode BUG in
include/linux/swapops.h (CVE-2023-4732)

* kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong
con2fb_map assignment (CVE-2023-38409)

* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Bug Fix(es):

* Intel 8.8 BUG SPR IOMMU: QAT Device Address Translation Issue with
Invalidation Completion Ordering (BZ#2221097)

* RHEL 8.9: intel_pstate may provide incorrect scaling values for hybrid capable
systems with E-cores disabled (BZ#2223403)

* Bring MD code inline with upstream (BZ#2235655)

* NAT sport clash in OCP causing 1 second TCP connection establishment delay.
(BZ#2236514)

* ibmvnic: NONFATAL reset causes dql BUG_ON crash (BZ#2236701)

* PVT:1050:NXGZIP: LPM of RHEL client lpar got failed with error HSCLA2CF in
19th loops (BZ#2236703)

* xfs: mount fails when device file name is long (BZ#2236813)

* NFSv4.0 client hangs when server reboot while client had outstanding lock
request to the server (BZ#2237840)

* i40e: backport selected bugfixes (BZ#2238305)

* Updates for NFS/NFSD/SUNRPC for RHEL 8.9 (BZ#2238394)

* SCSI updates for RHEL 8.9 (BZ#2238770)

* kernel: sleeping function called from invalid context at
kernel/locking/spinlock_rt.c:35 at: sock_map_update_elem_sys+0x85/0x2a0
(BZ#2239475)

* Random delay receiving packets after bringing up VLAN on top of VF with vf-
vlan-pruning enabled (BZ#2240751)

* RHEL-8.9 RDMA/restrack: Release MR restrack when delete (BZ#2244423)

Enhancement(s):

* Intel 8.9 FEAT EMR power: Add EMR CPU support to intel_rapl driver
(BZ#2230146)

* Intel 8.9 FEAT EMR tools: Add EMR CPU support to turbostat (BZ#2230154)

* Intel 8.9 FEAT EMR power: Add EMR support to the intel_idle driver
(BZ#2230155)

* Intel 8.9 FEAT EMR RAS: Add EDAC support for EMR (BZ#2230161)

* Intel 8.9 FEAT general: intel-speed-select (ISST): Update to latest release
(BZ#2230163)

* Intel 8.9 FEAT cpufreq: intel_pstate: Enable HWP IO boost for all servers
(BZ#2232123)

4. Solution:

For details on how to apply this update, which includes the changes described in
this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

2223949 - CVE-2022-40982 - hw: Intel: Gather Data Sampling (GDS) side channel
vulnerability
2148510 - CVE-2022-45884 - kernel: use-after-free due to race condition
occurring in dvb_register_device()
2148517 - CVE-2022-45886 - kernel: use-after-free due to race condition
occurring in dvb_net.c
2151956 - CVE-2022-45919 - kernel: use-after-free due to race condition
occurring in dvb_ca_en50221.c
2154178 - CVE-2023-1192 - kernel: use-after-free in smb2_is_status_io_timeout() 
2225201 - CVE-2023-3609 - kernel: net/sched: cls_u32 component reference counter
leak if tcf_change_indev() fails
2225511 - CVE-2023-4128 - kernel: net/sched: Use-after-free vulnerabilities in
the net/sched classifiers: cls_fw, cls_u32 and cls_route
2225511 - CVE-2023-4206 - kernel: net/sched: Use-after-free vulnerabilities in
the net/sched classifiers: cls_fw, cls_u32 and cls_route
2225511 - CVE-2023-4207 - kernel: net/sched: Use-after-free vulnerabilities in
the net/sched classifiers: cls_fw, cls_u32 and cls_route
2225511 - CVE-2023-4208 - kernel: net/sched: Use-after-free vulnerabilities in
the net/sched classifiers: cls_fw, cls_u32 and cls_route
2236982 - CVE-2023-4732 - kernel: Race between task migrating pages and another
task calling exit_mmap to release those same pages getting invalid opcode BUG in
include/linux/swapops.h
2230042 - CVE-2023-38409 - kernel: fbcon: out-of-sync arrays in
fbcon_mode_deleted due to wrong con2fb_map assignment
2239843 - CVE-2023-42753 - kernel: netfilter: potential slab-out-of-bound access
due to integer underflow

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v.8.8)

aarch64:
bpftool-0:4.18.0-477.36.1.el8_8.aarch64.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
perf-0:4.18.0-477.36.1.el8_8.aarch64.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
perf-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.ppc64le.rpm

s390x:
bpftool-0:4.18.0-477.36.1.el8_8.s390x.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
perf-0:4.18.0-477.36.1.el8_8.s390x.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.s390x.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.s390x.rpm

x86_64:
bpftool-0:4.18.0-477.36.1.el8_8.x86_64.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
perf-0:4.18.0-477.36.1.el8_8.x86_64.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.x86_64.rpm

Source:
kernel-0:4.18.0-477.36.1.el8_8.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-477.36.1.el8_8.noarch.rpm
kernel-doc-0:4.18.0-477.36.1.el8_8.noarch.rpm

Red Hat CodeReady Linux Builder EUS (v.8.8)

aarch64:
bpftool-0:4.18.0-477.36.1.el8_8.aarch64.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-debuginfo-common-aarch64-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.aarch64.rpm
perf-0:4.18.0-477.36.1.el8_8.aarch64.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.aarch64.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.aarch64.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.aarch64.rpm

ppc64le:
bpftool-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-debuginfo-common-ppc64le-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
perf-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.ppc64le.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.ppc64le.rpm

s390x:
bpftool-0:4.18.0-477.36.1.el8_8.s390x.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-debuginfo-common-s390x-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-core-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-devel-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-zfcpdump-modules-extra-0:4.18.0-477.36.1.el8_8.s390x.rpm
perf-0:4.18.0-477.36.1.el8_8.s390x.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.s390x.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.s390x.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.s390x.rpm

x86_64:
bpftool-0:4.18.0-477.36.1.el8_8.x86_64.rpm
bpftool-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-core-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-cross-headers-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-core-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-modules-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debug-modules-extra-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-debuginfo-common-x86_64-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-modules-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-modules-extra-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-libs-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-tools-libs-devel-0:4.18.0-477.36.1.el8_8.x86_64.rpm
perf-0:4.18.0-477.36.1.el8_8.x86_64.rpm
perf-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
python3-perf-0:4.18.0-477.36.1.el8_8.x86_64.rpm
python3-perf-debuginfo-0:4.18.0-477.36.1.el8_8.x86_64.rpm
kernel-headers-0:4.18.0-477.36.1.el8_8.x86_64.rpm

Source:
kernel-0:4.18.0-477.36.1.el8_8.src.rpm

noarch:
kernel-abi-stablelists-0:4.18.0-477.36.1.el8_8.noarch.rpm
kernel-doc-0:4.18.0-477.36.1.el8_8.noarch.rpm

7. References:

https://access.redhat.com/security/cve/CVE-2022-40982
https://access.redhat.com/security/cve/CVE-2022-45884
https://access.redhat.com/security/cve/CVE-2022-45886
https://access.redhat.com/security/cve/CVE-2022-45919
https://access.redhat.com/security/cve/CVE-2023-1192
https://access.redhat.com/security/cve/CVE-2023-3609
https://access.redhat.com/security/cve/CVE-2023-4128
https://access.redhat.com/security/cve/CVE-2023-4206
https://access.redhat.com/security/cve/CVE-2023-4207
https://access.redhat.com/security/cve/CVE-2023-4208
https://access.redhat.com/security/cve/CVE-2023-4732
https://access.redhat.com/security/cve/CVE-2023-38409
https://access.redhat.com/security/cve/CVE-2023-42753
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/solutions/7027704

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=kZB6
-----END PGP SIGNATURE-----