The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9315.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security update Advisory ID: RHSA-2024:9315-03 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2024:9315 Issue date: 2024-11-13 Revision: 03 CVE Names: CVE-2019-25162 ==================================================================== Summary: An update for kernel is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS) (CVE-2020-10135) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848) * kernel: stack overflow problem in Open vSwitch kernel module leading to DoS (CVE-2024-1151) * kernel: crash due to a missing check for leb_size (CVE-2024-25739) * kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach (CVE-2024-26591) * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS (CVE-2024-26589) * kernel: iommu: Don't reserve 0-length IOVA region (CVE-2023-52455) * kernel: bpf: fix check for attempt to corrupt spilled pointer (CVE-2023-52462) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: PCI/ASPM: Fix deadlock when enabling ASPM (CVE-2024-26605) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: ext4: regenerate buddy after block freeing failed if under fc replay (CVE-2024-26601) * kernel: out-of-bounds read in pci_dev_for_each_resource() (CVE-2023-52466) * kernel:null pointer dereference in of_syscon_register() (CVE-2023-52467) * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function (CVE-2024-24858) * kernel: use after free in i2c (CVE-2019-25162) * kernel: NULL pointer dereference in zone registration error path (CVE-2023-52473) * kernel: use-after-free in powermate_config_complete (CVE-2023-52475) * kernel: x86/srso: Add SRSO mitigation for Hygon processors (CVE-2023-52482) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: NULL Pointer dereference bluetooth allows Overflow Buffers (CVE-2024-22099) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ring-buffer: Do not attempt to read past \"commit\" (CVE-2023-52501) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: asix: fix uninit-value in asix_mdio_read() (CVE-2021-47101) * kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations (CVE-2021-47098) * kernel: powerpc/lib: Validate size for vector operations (CVE-2023-52606) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() (CVE-2023-52585) * kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code (CVE-2023-52498) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: mm: migrate: fix getting incorrect page mapping during page migration (CVE-2023-52490) * hw: arm64/sme: Always exit sme_alloc() early with existing storage (CVE-2024-26618) * kernel: netfs, fscache: Prevent Oops in fscache_put_cache() (CVE-2024-26612) * kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP (CVE-2024-26611) * kernel: tcp: make sure init the accept_queue's spinlocks once (CVE-2024-26614) * kernel: PM / devfreq: Fix buffer overflow in trans_stat_show (CVE-2023-52614) * kernel: pstore/ram: Fix crash when setting number of cpus to an odd number (CVE-2023-52619) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615) * kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (CVE-2024-26641) * kernel: nbd: always initialize struct msghdr completely (CVE-2024-26638) * kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (CVE-2024-26631) * kernel: tracing: Ensure visibility when inserting an element into tracing_map (CVE-2024-26645) * kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface (CVE-2023-52625) * kernel: drm/amd/display: Wake DMCUB before executing GPINT commands (CVE-2023-52624) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621) * kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM (CVE-2024-26646) * kernel: p2sb_bar() calls during PCI device probe (CVE-2024-26650) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 (CVE-2024-26660) * kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (CVE-2024-26661) * kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' (CVE-2024-26662) * kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (CVE-2024-26663) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (CVE-2024-26670) * kernel: drm/amdkfd: lock dependency warning with srcu (CVE-2023-52632) * kernel: drm/amd/display: Fix disable_otg_wa logic (CVE-2023-52634) * kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] (CVE-2023-52635) * kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' (CVE-2024-26672) * kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (CVE-2024-26674) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section (CVE-2024-26678) * kernel: inet: read sk->sk_family once in inet_recv_error() (CVE-2024-26679) * kernel: net: atlantic: Fix DMA mapping for PTP hwts ring (CVE-2024-26680) * kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (CVE-2023-52637) * kernel: KVM: arm64: Fix circular locking dependency (CVE-2024-26691) * kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats (CVE-2024-26686) * kernel: drm/amd/display: Fix MST Null Ptr for RV (CVE-2024-26700) * kernel: dpll: fix possible deadlock during netlink dump operation (CVE-2024-26725) * kernel: nouveau: offload fence uevents work to workqueue (CVE-2024-26719) * kernel: HID: i2c-hid-of: fix NULL-deref on failed power up (CVE-2024-26717) * kernel: powerpc/kasan: Fix addr error caused by page alignment (CVE-2024-26712) * kernel: mptcp: really cope with fastopen race (CVE-2024-26708) * kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() (CVE-2024-26707) * kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704) * kernel: drm/amd/display: fixed integer types and null check locations (CVE-2024-26767) * kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (CVE-2024-26761) * kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759) * kernel: md: Don't ignore suspended array in md_check_recovery() (CVE-2024-26758) * kernel: md: Don't ignore read-only array in md_check_recovery() (CVE-2024-26757) * kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (CVE-2024-26774) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772) * kernel: arp: Prevent overflow in arp_req_get(). (CVE-2024-26733) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: net/sched: act_mirred: use the backlog for mirred ingress (CVE-2024-26740) * kernel: dmaengine: idxd: Ensure safe user copy of completion record (CVE-2024-26746) * kernel: net: veth: clear GRO when clearing XDP even when down (CVE-2024-26803) * kernel: iommufd: Fix iopt_access_list_id overwrite bug (CVE-2024-26786) * kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (CVE-2024-26785) * kernel: mptcp: fix double-free on socket dismantle (CVE-2024-26782) * kernel: vfio/pci: Create persistent INTx handler (CVE-2024-26812) * kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ (CVE-2024-27437) * kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check (CVE-2024-26815) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: nvme-fc: do not wait in vain when unloading module (CVE-2024-26846) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: cachefiles: fix memory leak in cachefiles_add_cache() (CVE-2024-26840) * kernel: RDMA/irdma: Fix KASAN issue with tasklet (CVE-2024-26838) * kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload (CVE-2024-26837) * kernel: netfilter: nf_tables: set dormant flag on hook register failure (CVE-2024-26835) * kernel: iio: core: fix memleak in iio_device_register_sysfs (CVE-2023-52643) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906) * kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (CVE-2024-26903) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: md: fix kmemleak of rdev->serial (CVE-2024-26900) * kernel: block: fix deadlock between bd_link_disk_holder and partition scan (CVE-2024-26899) * kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (CVE-2024-26894) * kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() (CVE-2024-26892) * kernel: Bluetooth: btrtl: fix out of bounds memory access (CVE-2024-26890) * kernel: Bluetooth: hci_core: Fix possible buffer overflow (CVE-2024-26889) * kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() (CVE-2024-26882) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (CVE-2024-26870) * kernel: hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863) * kernel: packet: annotate data-races around ignore_outgoing (CVE-2024-26862) * kernel: wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861) * kernel: geneve: make sure to pull inner header in geneve_rx() (CVE-2024-26857) * kernel: tracing/trigger: Fix to return error if failed to alloc snapshot (CVE-2024-26920) * kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit (CVE-2024-26915) * kernel: inet: inet_defrag: prevent sk release while still in use (CVE-2024-26921) * kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly (CVE-2024-26922) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: ASoC: SOF: Add some bounds checking to firmware data (CVE-2024-26927) * kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() (CVE-2024-26928) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (CVE-2024-26962) * kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() (CVE-2024-26960) * kernel: nfs: fix UAF in direct writes (CVE-2024-26958) * kernel: net: esp: fix bad handling of pages from page_pool (CVE-2024-26953) * kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list (CVE-2024-26951) * kernel: wireguard: netlink: access device through ctx instead of peer (CVE-2024-26950) * kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (CVE-2024-26940) * kernel: drm/i915/vma: Fix UAF on destroy against retire race (CVE-2024-26939) * kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (CVE-2024-26938) * kernel: drm/i915/gt: Reset queue_priority_hint on parking (CVE-2024-26937) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port "disable" sysfs attribute (CVE-2024-26933) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: netfilter: flowtable: incorrect pppoe tuple (CVE-2024-27015) * kernel: net/mlx5e: Prevent deadlock while disabling aRFS (CVE-2024-27014) * kernel: tun: limit printing rate when illegal packet received by tun dev (CVE-2024-27013) * kernel: netfilter: nf_tables: restore set elements when delete set fails (CVE-2024-27012) * kernel: netfilter: nf_tables: fix memleak in map from abort path (CVE-2024-27011) * kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010) * kernel: clk: Get runtime PM before walking tree during disable_unused (CVE-2024-27004) * kernel: clk: Get runtime PM before walking tree for clk_summary (CVE-2024-27003) * kernel: KVM: x86/pmu: Disable support for adaptive PEBS (CVE-2024-26992) * kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (CVE-2024-26990) * kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() (CVE-2024-26989) * kernel: init/main.c: Fix potential static_command_line memory overflow (CVE-2024-26988) * kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled (CVE-2024-26987) * kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: powercap: intel_rapl: Fix a NULL pointer dereference (CVE-2024-26975) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (CVE-2024-27057) * kernel: wifi: brcm80211: handle pmk_op allocation failure (CVE-2024-27048) * kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (CVE-2024-27042) * kernel: clk: Fix clk_core_get NULL dereference (CVE-2024-27038) * kernel: nbd: null check for nla_nest_start (CVE-2024-27025) * kernel: md: Fix missing release of 'active_io' for flush (CVE-2024-27023) * kernel: iommu/vt-d: Fix NULL domain on device release (CVE-2024-27079) * kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node (CVE-2023-52650) * kernel: drm/vkms: Avoid reading beyond LUT array (CVE-2023-52649) * kernel: pstore: inode: Only d_invalidate() is needed (CVE-2024-27389) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state (CVE-2023-52648) * kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() (CVE-2022-48672) * kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (CVE-2022-48703) * kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit (CVE-2024-27395) * kernel: io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656) * kernel: dm-raid: really frozen sync_thread during suspend (CVE-2024-35794) * kernel: md/md-bitmap: fix incorrect usage for sb_index (CVE-2024-35787) * kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program (CVE-2024-27431) * kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (CVE-2024-27414) * kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410) * kernel: mptcp: fix data races on remote_id (CVE-2024-27404) * kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. (CVE-2024-27436) * kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (CVE-2023-52659) * kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs (CVE-2024-35795) * kernel: wifi: mac80211: fix potential sta-link leak (CVE-2024-35838) * kernel: net/mlx5e: fix a double-free in arfs_create_groups (CVE-2024-35835) * kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails (CVE-2024-35831) * kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (CVE-2024-35827) * kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume (CVE-2024-35824) * kernel: usb: udc: remove warning when queue disabled ep (CVE-2024-35822) * kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (CVE-2024-35817) * kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling (CVE-2024-35814) * kernel: usb: cdc-wdm: close race between read and workqueue (CVE-2024-35812) * kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810) * kernel: PCI/PM: Drain runtime-idle callbacks before driver removal (CVE-2024-35809) * kernel: md/dm-raid: don't call md_reap_sync_thread() directly (CVE-2024-35808) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: dm snapshot: fix lockup in dm_exception_table_exit (CVE-2024-35805) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: block: fix module reference leakage from bdev_open_by_dev error path (CVE-2024-35859) * kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update (CVE-2024-35855) * kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash (CVE-2024-35854) * kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (CVE-2024-35853) * kernel: irqchip/gic-v3-its: Prevent double free on error (CVE-2024-35847) * kernel: iommu/vt-d: Use device rbtree in iopf reporting path (CVE-2024-35843) * kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (CVE-2024-35840) * kernel: calipso: fix memory leak in netlbl_calipso_add_pass() (CVE-2023-52698) * kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL (CVE-2023-52697) * kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init() (CVE-2023-52696) * kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one() (CVE-2023-52690) * kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels (CVE-2023-52689) * kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686) * kernel: ACPI: LPIT: Avoid u32 multiplication overflow (CVE-2023-52683) * kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get() (CVE-2023-52680) * kernel: of: Fix double free in of_parse_phandle_with_args_map (CVE-2023-52679) * kernel: bpf: Guard stack limits against 32bit overflow (CVE-2023-52676) * kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() (CVE-2023-52674) * kernel: net: atlantic: eliminate double free in error handling logic (CVE-2023-52664) * kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() (CVE-2023-52663) * kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (CVE-2023-52662) * kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (CVE-2023-52661) * kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947) * kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (CVE-2024-35928) * kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (CVE-2024-35930) * kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery (CVE-2024-35931) * kernel: drm: Check output polling initialized before disabling (CVE-2024-35927) * kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (CVE-2024-35913) * kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks (CVE-2024-35912) * kernel: tls: get psock ref after taking rxlock to avoid leak (CVE-2024-35908) * kernel: bpf: Protect against int overflow for stack access size (CVE-2024-35905) * kernel: selinux: avoid dereference of garbage after mount failure (CVE-2024-35904) * kernel: netfilter: nf_tables: reject new basechain after table flag update (CVE-2024-35900) * kernel: mptcp: prevent BPF accessing lowat from a subflow socket. (CVE-2024-35894) * kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (CVE-2024-35892) * kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888) * kernel: ipv6: Fix infinite recursion in fib6_dump_done(). (CVE-2024-35886) * kernel: io_uring/kbuf: hold io_buffer_list reference over mmap (CVE-2024-35880) * kernel: of: module: prevent NULL pointer dereference in vsnprintf() (CVE-2024-35878) * kernel: x86/mm/pat: fix VM_PAT handling in COW mappings (CVE-2024-35877) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios (CVE-2024-35872) * kernel: smb: client: guarantee refcounted children from parent session (CVE-2024-35869) * kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925) * kernel: smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867) * kernel: usb: typec: ucsi: Limit read size on v1.2 (CVE-2024-35924) * kernel: smb: client: fix potential UAF in cifs_dump_full_key() (CVE-2024-35866) * kernel: io_uring: clear opcode specific data for an early failure (CVE-2024-35923) * kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() (CVE-2024-35865) * kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() (CVE-2024-35864) * kernel: smb: client: fix potential UAF in is_valid_oplock_break() (CVE-2024-35863) * kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() (CVE-2024-35862) * kernel: randomize_kstack: Improve entropy diffusion (CVE-2024-35918) * kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() (CVE-2024-35861) * kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() (CVE-2024-35944) * kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (CVE-2024-35942) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB (CVE-2024-35938) * kernel: wifi: rtw89: fix null pointer access when abort scan (CVE-2024-35946) * kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue (CVE-2024-35991) * kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS (CVE-2024-35983) * kernel: raid1: fix use-after-free for original bio in raid1_write_request() (CVE-2024-35979) * kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (CVE-2024-35976) * kernel: geneve: fix header validation in geneve[6]_xmit_skb (CVE-2024-35973) * kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959) * kernel: iommu/vt-d: Fix WARN_ON in iommu probe path (CVE-2024-35957) * kernel: scsi: sg: Avoid sg device teardown race (CVE-2024-35954) * kernel: drm/ast: Fix soft lockup (CVE-2024-35952) * kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex (CVE-2024-35950) * kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage (CVE-2024-36006) * kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses (CVE-2024-35995) * kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI (CVE-2021-47429) * kernel: powerpc/64s: fix program check interrupt emergency stack path (CVE-2021-47428) * kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47386) * kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384) * kernel: lib/generic-radix-tree.c: Don't overflow in peek() (CVE-2021-47432) * kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path (CVE-2023-52703) * kernel: pstore/platform: Add check for kstrdup (CVE-2023-52869) * kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size (CVE-2023-52762) * kernel: nbd: fix uaf in nbd_open (CVE-2023-52837) * kernel: mmc: sdio: fix possible resource leaks in some error paths (CVE-2023-52730) * kernel: smb: client: fix potential deadlock when releasing mids (CVE-2023-52757) * kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (CVE-2023-52819) * kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls (CVE-2023-52788) * kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET (CVE-2023-52813) * kernel: drm/amdgpu: Fix potential null pointer derefernce (CVE-2023-52814) * kernel: drm/radeon: possible buffer overflow (CVE-2023-52867) * kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (CVE-2023-52817) * kernel: spi: Fix null dereference on suspend (CVE-2023-52749) * kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds (CVE-2023-52878) * kernel: net/smc: avoid data corruption caused by decline (CVE-2023-52775) * kernel: cpu/hotplug: Don't offline the last non-isolated CPU (CVE-2023-52831) * kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (CVE-2023-52740) * kernel: pwm: Fix double shift bug (CVE-2023-52756) * kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811) * kernel: atl1c: Work around the DMA RX overflow issue (CVE-2023-52834) * kernel: perf: hisi: Fix use-after-free when register pmu fails (CVE-2023-52859) * kernel: i2c: dev: copy userspace array safely (CVE-2023-52758) * kernel: smb: client: fix use-after-free in smb2_query_info_compound() (CVE-2023-52751) * kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (CVE-2023-52840) * kernel: Bluetooth: btusb: Add date->evt_skb is NULL check (CVE-2023-52833) * kernel: i2c: core: Run atomic i2c xfer when !preemptible (CVE-2023-52791) * kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784) * kernel: fbdev: Fix invalid page access after closing deferred I/O devices (CVE-2023-52731) * kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() (CVE-2021-47457) * kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline (CVE-2021-47454) * kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells (CVE-2021-47497) * kernel: usbnet: sanity check for maxpacket (CVE-2021-47495) * kernel: igb: Fix string truncation warnings in igb_set_fw_version (CVE-2024-36010) * kernel: aio: fix use-after-free due to missing POLLFREE handling (CVE-2021-47505) * kernel: ppdev: Add an error check in register_device (CVE-2024-36015) * kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (CVE-2024-36885) * kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() (CVE-2024-36884) * kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() (CVE-2024-36882) * kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones (CVE-2024-36881) * kernel: octeontx2-af: fix the double free in rvu_npc_freemem() (CVE-2024-36030) * kernel: keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031) * kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() (CVE-2024-36028) * kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload (CVE-2024-36022) * kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (CVE-2024-36945) * kernel: Reapply "drm/qxl: simplify qxl_fence_wait" (CVE-2024-36944) * kernel: pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940) * kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933) * kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal (CVE-2024-36932) * kernel: spi: fix null pointer dereference within spi_sync (CVE-2024-36930) * kernel: ipv4: Fix uninit-value access in __ip_make_skb() (CVE-2024-36927) * kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE (CVE-2024-36926) * kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (CVE-2024-36920) * kernel: block: fix overflow in blk_ioctl_discard() (CVE-2024-36917) * kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905) * kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902) * kernel: USB: core: Fix access violation during port device removal (CVE-2024-36896) * kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference (CVE-2024-36891) * kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal (CVE-2024-36956) * kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (CVE-2024-36955) * kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939) * kernel: ipv6: prevent NULL dereference in ip6_output() (CVE-2024-36901) * kernel: thermal/debugfs: Fix two locking issues with thermal zone debug (CVE-2024-36961) * kernel: drm/vmwgfx: Fix invalid reads in fence signaled events (CVE-2024-36960) * kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() (CVE-2024-36967) * kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command (CVE-2024-36977) * kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (CVE-2024-36974) * kernel: ALSA: timer: Set lower bound of start tick time (CVE-2024-38618) * kernel: ALSA: core: Fix NULL module pointer assignment at card init (CVE-2024-38605) * kernel: block: refine the EOF check in blkdev_iomap_begin (CVE-2024-38604) * kernel: ALSA: Fix deadlocks with kctl removals at disconnection (CVE-2024-38600) * kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598) * kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (CVE-2024-38596) * kernel: drm/amdgpu/mes: fix use-after-free issue (CVE-2024-38581) * kernel: net/mlx5: Discard command completions in internal error (CVE-2024-38555) * kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (CVE-2024-36477) * kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (CVE-2024-38388) * kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (CVE-2024-31076) * kernel: soundwire: cadence: fix invalid PDI offset (CVE-2024-38635) * kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() (CVE-2024-38632) * kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida (CVE-2024-38629) * kernel: stm class: Fix a double free in stm_register_device() (CVE-2024-38627) * kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (CVE-2024-39291) * kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages (CVE-2024-39298) * kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (CVE-2024-39276) * kernel: drm/amdgpu: add error handle to avoid out-of-bounds (CVE-2024-39471) * kernel: drm/i915/hwmon: Get rid of devm (CVE-2024-39479) * kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (CVE-2024-39473) * kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (CVE-2024-39474) * kernel: efi/unaccepted: touch soft lockup during memory accept (CVE-2024-36936) * kernel: drm/drm_file: Fix pid refcounting race (CVE-2024-39486) * kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (CVE-2024-39488) * kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (CVE-2024-39491) * kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (CVE-2024-39497) * kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (CVE-2024-39498) * kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() (CVE-2024-39499) * kernel: drivers: core: synchronize really_probe() and dev_uevent() (CVE-2024-39501) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (CVE-2024-39508) * kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (CVE-2024-40903) * kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906) * kernel: ionic: fix kernel panic in XDP_TX action (CVE-2024-40907) * kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (CVE-2024-40913) * kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (CVE-2024-40919) * kernel: io_uring/rsrc: don't lock while !TASK_RUNNING (CVE-2024-40922) * kernel: vmxnet3: disable rx data ring on dma allocation failure (CVE-2024-40923) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: block: fix request.queuelist usage in flush (CVE-2024-40925) * kernel: wifi: cfg80211: validate HE operation element parsing (CVE-2024-40930) * kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (CVE-2024-40940) * kernel: iommu: Return right value in iommu_sva_bind_device() (CVE-2024-40945) * kernel: mm/page_table_check: fix crash on ZONE_DEVICE (CVE-2024-40948) * kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer (CVE-2024-40965) * kernel: tty: add the option to have a tty reject a new ldisc (CVE-2024-40966) * kernel: serial: imx: Introduce timeout when waiting on transmitter empty (CVE-2024-40967) * kernel: drm/radeon: fix UBSAN warning in kv_dpm.c (CVE-2024-40988) * kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown (CVE-2024-40989) * kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (CVE-2024-40997) * kernel: io_uring/sqpoll: work around a potential audit memory leak (CVE-2024-41001) * kernel: net: hns3: fix kernel crash problem in concurrent scenario (CVE-2024-39507) * kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (CVE-2024-40901) * kernel: tcp: avoid too many retransmit packets (CVE-2024-41007) * kernel: drm/amdgpu: change vm->task_info handling (CVE-2024-41008) * kernel: vt_ioctl: fix array_index_nospec in vt_setactivate (CVE-2022-48804) * kernel: bluetooth: race condition in sniff_{min,max}_interval_set() (CVE-2024-24859) * kernel: filelock: Remove locks reliably when fcntl/close race is detected (CVE-2024-41012) * kernel: filelock: Fix fcntl/close race recovery compat path (CVE-2024-41020) * kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask (CVE-2024-41032) * kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (CVE-2024-41038) * kernel: firmware: cs_dsp: Fix overflow checking of wmfw header (CVE-2024-41039) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: filelock: fix potential use-after-free in posix_lock_inode (CVE-2024-41049) * kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (CVE-2024-41056) * kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (CVE-2024-41057) * kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (CVE-2024-41058) * kernel: drm/radeon: check bo_va->bo is non-NULL before using it (CVE-2024-41060) * kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (CVE-2024-41063) * kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace (CVE-2024-41065) * kernel: null_blk: fix validation of block size (CVE-2024-41077) * kernel: nvmet: always initialize cqe.result (CVE-2024-41079) * kernel: nvme-fabrics: use reserved tag for reg read/write command (CVE-2024-41082) * kernel: cxl/region: Avoid null pointer dereference in region lookup (CVE-2024-41084) * kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling (CVE-2024-41085) * kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (CVE-2024-41089) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: drm/fbdev-dma: Only set smem_start is enable per module option (CVE-2024-41094) * kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (CVE-2024-41095) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: nfsd: initialise nfsd_info.mutex early. (CVE-2024-42078) * kernel: ftruncate: pass a signed offset (CVE-2024-42084) * kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (CVE-2024-42090) * kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (CVE-2024-42101) * kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (CVE-2024-42114) * kernel: drm/amdgpu: fix double free err_addr pointer warnings (CVE-2024-42123) * kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible (CVE-2024-42124) * kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (CVE-2024-42125) * kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (CVE-2024-42132) * kernel: Bluetooth: ISO: Check socket flag instead of hcon (CVE-2024-42141) * kernel: tcp_metrics: validate source addr length (CVE-2024-42154) * kernel: scsi: mpi3mr: Sanitise num_phys (CVE-2024-42159) * kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (CVE-2024-42226) * kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (CVE-2024-42228) * kernel: firmware: cs_dsp: Validate payload length before processing block (CVE-2024-42237) * kernel: firmware: cs_dsp: Return error if block header overflows file (CVE-2024-42238) * kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation (CVE-2024-42240) * kernel: Revert \"sched/fair: Make sure to try to detach at least one movable task\" (CVE-2024-42245) * kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines (CVE-2024-42258) * kernel: net/mlx5: Fix missing lock on sync reset reload (CVE-2024-42268) * kernel: net/iucv: fix use after free in iucv_sock_close() (CVE-2024-42271) * kernel: nvme-pci: add missing condition check for existence of mapped data (CVE-2024-42276) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: net: missing check virtio (CVE-2024-43817) * kernel: nfs: pass explicit offset/count to trace events (CVE-2024-43826) * kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() (CVE-2024-43830) * kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842) * kernel: dma: fix call order in dmam_free_coherent (CVE-2024-43856) * kernel: s390/fpu: Re-add exception handling in load_fpu_state() (CVE-2024-43865) * kernel: net/mlx5: Always drain health in shutdown callback (CVE-2024-43866) * kernel: perf: Fix event leak upon exec and file release (CVE-2024-43869) * kernel: perf: Fix event leak upon exit (CVE-2024-43870) * kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (CVE-2024-43879) * kernel: nommu: fix memory leak in do_mmap() error path (CVE-2023-52902) * kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. (CVE-2022-48929) * kernel: mm: list_lru: fix UAF for memory cgroup (CVE-2024-43888) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (CVE-2024-43911) * kernel: fuse: Initialize beyond-EOF page contents before setting uptodate (CVE-2024-44947) * kernel: usb: gadget: core: Check for unset descriptor (CVE-2024-44960) * kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption (CVE-2024-44965) * kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970) * kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (CVE-2024-44984) * kernel: KVM: s390: fix validity interception issue when gisa is switched off (CVE-2024-45005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section. Solution: https://access.redhat.com/articles/11258 CVEs: CVE-2019-25162 References: https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index https://access.redhat.com/security/updates/classification/#moderate https://bugzilla.redhat.com/show_bug.cgi?id=1832397 https://bugzilla.redhat.com/show_bug.cgi?id=2257406 https://bugzilla.redhat.com/show_bug.cgi?id=2260038 https://bugzilla.redhat.com/show_bug.cgi?id=2262241 https://bugzilla.redhat.com/show_bug.cgi?id=2263879 https://bugzilla.redhat.com/show_bug.cgi?id=2265648 https://bugzilla.redhat.com/show_bug.cgi?id=2265650 https://bugzilla.redhat.com/show_bug.cgi?id=2265654 https://bugzilla.redhat.com/show_bug.cgi?id=2265657 https://bugzilla.redhat.com/show_bug.cgi?id=2265793 https://bugzilla.redhat.com/show_bug.cgi?id=2265798 https://bugzilla.redhat.com/show_bug.cgi?id=2265800 https://bugzilla.redhat.com/show_bug.cgi?id=2265831 https://bugzilla.redhat.com/show_bug.cgi?id=2265833 https://bugzilla.redhat.com/show_bug.cgi?id=2265836 https://bugzilla.redhat.com/show_bug.cgi?id=2266210 https://bugzilla.redhat.com/show_bug.cgi?id=2266212 https://bugzilla.redhat.com/show_bug.cgi?id=2266247 https://bugzilla.redhat.com/show_bug.cgi?id=2266249 https://bugzilla.redhat.com/show_bug.cgi?id=2266296 https://bugzilla.redhat.com/show_bug.cgi?id=2266363 https://bugzilla.redhat.com/show_bug.cgi?id=2266916 https://bugzilla.redhat.com/show_bug.cgi?id=2267028 https://bugzilla.redhat.com/show_bug.cgi?id=2267038 https://bugzilla.redhat.com/show_bug.cgi?id=2267701 https://bugzilla.redhat.com/show_bug.cgi?id=2267705 https://bugzilla.redhat.com/show_bug.cgi?id=2267724 https://bugzilla.redhat.com/show_bug.cgi?id=2267730 https://bugzilla.redhat.com/show_bug.cgi?id=2267782 https://bugzilla.redhat.com/show_bug.cgi?id=2267789 https://bugzilla.redhat.com/show_bug.cgi?id=2267797 https://bugzilla.redhat.com/show_bug.cgi?id=2267804 https://bugzilla.redhat.com/show_bug.cgi?id=2267916 https://bugzilla.redhat.com/show_bug.cgi?id=2267920 https://bugzilla.redhat.com/show_bug.cgi?id=2268293 https://bugzilla.redhat.com/show_bug.cgi?id=2268315 https://bugzilla.redhat.com/show_bug.cgi?id=2268317 https://bugzilla.redhat.com/show_bug.cgi?id=2268335 https://bugzilla.redhat.com/show_bug.cgi?id=2269063 https://bugzilla.redhat.com/show_bug.cgi?id=2269183 https://bugzilla.redhat.com/show_bug.cgi?id=2269187 https://bugzilla.redhat.com/show_bug.cgi?id=2269192 https://bugzilla.redhat.com/show_bug.cgi?id=2269201 https://bugzilla.redhat.com/show_bug.cgi?id=2269203 https://bugzilla.redhat.com/show_bug.cgi?id=2269211 https://bugzilla.redhat.com/show_bug.cgi?id=2270071 https://bugzilla.redhat.com/show_bug.cgi?id=2270084 https://bugzilla.redhat.com/show_bug.cgi?id=2270093 https://bugzilla.redhat.com/show_bug.cgi?id=2270097 https://bugzilla.redhat.com/show_bug.cgi?id=2270103 https://bugzilla.redhat.com/show_bug.cgi?id=2270133 https://bugzilla.redhat.com/show_bug.cgi?id=2271648 https://bugzilla.redhat.com/show_bug.cgi?id=2271682 https://bugzilla.redhat.com/show_bug.cgi?id=2271684 https://bugzilla.redhat.com/show_bug.cgi?id=2271688 https://bugzilla.redhat.com/show_bug.cgi?id=2271690 https://bugzilla.redhat.com/show_bug.cgi?id=2271788 https://bugzilla.redhat.com/show_bug.cgi?id=2271795 https://bugzilla.redhat.com/show_bug.cgi?id=2272692 https://bugzilla.redhat.com/show_bug.cgi?id=2272782 https://bugzilla.redhat.com/show_bug.cgi?id=2272784 https://bugzilla.redhat.com/show_bug.cgi?id=2272786 https://bugzilla.redhat.com/show_bug.cgi?id=2272788 https://bugzilla.redhat.com/show_bug.cgi?id=2272791 https://bugzilla.redhat.com/show_bug.cgi?id=2272795 https://bugzilla.redhat.com/show_bug.cgi?id=2272800 https://bugzilla.redhat.com/show_bug.cgi?id=2272804 https://bugzilla.redhat.com/show_bug.cgi?id=2272806 https://bugzilla.redhat.com/show_bug.cgi?id=2272808 https://bugzilla.redhat.com/show_bug.cgi?id=2272814 https://bugzilla.redhat.com/show_bug.cgi?id=2272818 https://bugzilla.redhat.com/show_bug.cgi?id=2272829 https://bugzilla.redhat.com/show_bug.cgi?id=2272836 https://bugzilla.redhat.com/show_bug.cgi?id=2272839 https://bugzilla.redhat.com/show_bug.cgi?id=2272842 https://bugzilla.redhat.com/show_bug.cgi?id=2273085 https://bugzilla.redhat.com/show_bug.cgi?id=2273098 https://bugzilla.redhat.com/show_bug.cgi?id=2273109 https://bugzilla.redhat.com/show_bug.cgi?id=2273113 https://bugzilla.redhat.com/show_bug.cgi?id=2273130 https://bugzilla.redhat.com/show_bug.cgi?id=2273143 https://bugzilla.redhat.com/show_bug.cgi?id=2273148 https://bugzilla.redhat.com/show_bug.cgi?id=2273158 https://bugzilla.redhat.com/show_bug.cgi?id=2273166 https://bugzilla.redhat.com/show_bug.cgi?id=2273168 https://bugzilla.redhat.com/show_bug.cgi?id=2273174 https://bugzilla.redhat.com/show_bug.cgi?id=2273185 https://bugzilla.redhat.com/show_bug.cgi?id=2273200 https://bugzilla.redhat.com/show_bug.cgi?id=2273204 https://bugzilla.redhat.com/show_bug.cgi?id=2273206 https://bugzilla.redhat.com/show_bug.cgi?id=2273208 https://bugzilla.redhat.com/show_bug.cgi?id=2273234 https://bugzilla.redhat.com/show_bug.cgi?id=2273242 https://bugzilla.redhat.com/show_bug.cgi?id=2273247 https://bugzilla.redhat.com/show_bug.cgi?id=2273260 https://bugzilla.redhat.com/show_bug.cgi?id=2273262 https://bugzilla.redhat.com/show_bug.cgi?id=2273268 https://bugzilla.redhat.com/show_bug.cgi?id=2273408 https://bugzilla.redhat.com/show_bug.cgi?id=2273425 https://bugzilla.redhat.com/show_bug.cgi?id=2273459 https://bugzilla.redhat.com/show_bug.cgi?id=2273461 https://bugzilla.redhat.com/show_bug.cgi?id=2273468 https://bugzilla.redhat.com/show_bug.cgi?id=2273650 https://bugzilla.redhat.com/show_bug.cgi?id=2273657 https://bugzilla.redhat.com/show_bug.cgi?id=2274478 https://bugzilla.redhat.com/show_bug.cgi?id=2274624 https://bugzilla.redhat.com/show_bug.cgi?id=2275558 https://bugzilla.redhat.com/show_bug.cgi?id=2275565 https://bugzilla.redhat.com/show_bug.cgi?id=2275573 https://bugzilla.redhat.com/show_bug.cgi?id=2275578 https://bugzilla.redhat.com/show_bug.cgi?id=2275580 https://bugzilla.redhat.com/show_bug.cgi?id=2275584 https://bugzilla.redhat.com/show_bug.cgi?id=2275624 https://bugzilla.redhat.com/show_bug.cgi?id=2275633 https://bugzilla.redhat.com/show_bug.cgi?id=2275635 https://bugzilla.redhat.com/show_bug.cgi?id=2275641 https://bugzilla.redhat.com/show_bug.cgi?id=2275645 https://bugzilla.redhat.com/show_bug.cgi?id=2275647 https://bugzilla.redhat.com/show_bug.cgi?id=2275650 https://bugzilla.redhat.com/show_bug.cgi?id=2275661 https://bugzilla.redhat.com/show_bug.cgi?id=2275666 https://bugzilla.redhat.com/show_bug.cgi?id=2275670 https://bugzilla.redhat.com/show_bug.cgi?id=2275672 https://bugzilla.redhat.com/show_bug.cgi?id=2275686 https://bugzilla.redhat.com/show_bug.cgi?id=2275694 https://bugzilla.redhat.com/show_bug.cgi?id=2275707 https://bugzilla.redhat.com/show_bug.cgi?id=2275711 https://bugzilla.redhat.com/show_bug.cgi?id=2275725 https://bugzilla.redhat.com/show_bug.cgi?id=2275727 https://bugzilla.redhat.com/show_bug.cgi?id=2275729 https://bugzilla.redhat.com/show_bug.cgi?id=2275737 https://bugzilla.redhat.com/show_bug.cgi?id=2275775 https://bugzilla.redhat.com/show_bug.cgi?id=2275790 https://bugzilla.redhat.com/show_bug.cgi?id=2275928 https://bugzilla.redhat.com/show_bug.cgi?id=2276665 https://bugzilla.redhat.com/show_bug.cgi?id=2277168 https://bugzilla.redhat.com/show_bug.cgi?id=2277844 https://bugzilla.redhat.com/show_bug.cgi?id=2277937 https://bugzilla.redhat.com/show_bug.cgi?id=2278169 https://bugzilla.redhat.com/show_bug.cgi?id=2278174 https://bugzilla.redhat.com/show_bug.cgi?id=2278178 https://bugzilla.redhat.com/show_bug.cgi?id=2278182 https://bugzilla.redhat.com/show_bug.cgi?id=2278193 https://bugzilla.redhat.com/show_bug.cgi?id=2278197 https://bugzilla.redhat.com/show_bug.cgi?id=2278200 https://bugzilla.redhat.com/show_bug.cgi?id=2278218 https://bugzilla.redhat.com/show_bug.cgi?id=2278220 https://bugzilla.redhat.com/show_bug.cgi?id=2278229 https://bugzilla.redhat.com/show_bug.cgi?id=2278231 https://bugzilla.redhat.com/show_bug.cgi?id=2278237 https://bugzilla.redhat.com/show_bug.cgi?id=2278240 https://bugzilla.redhat.com/show_bug.cgi?id=2278262 https://bugzilla.redhat.com/show_bug.cgi?id=2278266 https://bugzilla.redhat.com/show_bug.cgi?id=2278268 https://bugzilla.redhat.com/show_bug.cgi?id=2278270 https://bugzilla.redhat.com/show_bug.cgi?id=2278275 https://bugzilla.redhat.com/show_bug.cgi?id=2278277 https://bugzilla.redhat.com/show_bug.cgi?id=2278279 https://bugzilla.redhat.com/show_bug.cgi?id=2278291 https://bugzilla.redhat.com/show_bug.cgi?id=2278293 https://bugzilla.redhat.com/show_bug.cgi?id=2278316 https://bugzilla.redhat.com/show_bug.cgi?id=2278320 https://bugzilla.redhat.com/show_bug.cgi?id=2278322 https://bugzilla.redhat.com/show_bug.cgi?id=2278324 https://bugzilla.redhat.com/show_bug.cgi?id=2278327 https://bugzilla.redhat.com/show_bug.cgi?id=2278333 https://bugzilla.redhat.com/show_bug.cgi?id=2278350 https://bugzilla.redhat.com/show_bug.cgi?id=2278352 https://bugzilla.redhat.com/show_bug.cgi?id=2278356 https://bugzilla.redhat.com/show_bug.cgi?id=2278387 https://bugzilla.redhat.com/show_bug.cgi?id=2278406 https://bugzilla.redhat.com/show_bug.cgi?id=2278431 https://bugzilla.redhat.com/show_bug.cgi?id=2278447 https://bugzilla.redhat.com/show_bug.cgi?id=2278456 https://bugzilla.redhat.com/show_bug.cgi?id=2278484 https://bugzilla.redhat.com/show_bug.cgi?id=2278488 https://bugzilla.redhat.com/show_bug.cgi?id=2278492 https://bugzilla.redhat.com/show_bug.cgi?id=2278522 https://bugzilla.redhat.com/show_bug.cgi?id=2278524 https://bugzilla.redhat.com/show_bug.cgi?id=2278532 https://bugzilla.redhat.com/show_bug.cgi?id=2278537 https://bugzilla.redhat.com/show_bug.cgi?id=2278539 https://bugzilla.redhat.com/show_bug.cgi?id=2278939 https://bugzilla.redhat.com/show_bug.cgi?id=2278960 https://bugzilla.redhat.com/show_bug.cgi?id=2280440 https://bugzilla.redhat.com/show_bug.cgi?id=2280444 https://bugzilla.redhat.com/show_bug.cgi?id=2281045 https://bugzilla.redhat.com/show_bug.cgi?id=2281061 https://bugzilla.redhat.com/show_bug.cgi?id=2281069 https://bugzilla.redhat.com/show_bug.cgi?id=2281103 https://bugzilla.redhat.com/show_bug.cgi?id=2281113 https://bugzilla.redhat.com/show_bug.cgi?id=2281125 https://bugzilla.redhat.com/show_bug.cgi?id=2281141 https://bugzilla.redhat.com/show_bug.cgi?id=2281145 https://bugzilla.redhat.com/show_bug.cgi?id=2281155 https://bugzilla.redhat.com/show_bug.cgi?id=2281157 https://bugzilla.redhat.com/show_bug.cgi?id=2281165 https://bugzilla.redhat.com/show_bug.cgi?id=2281173 https://bugzilla.redhat.com/show_bug.cgi?id=2281183 https://bugzilla.redhat.com/show_bug.cgi?id=2281189 https://bugzilla.redhat.com/show_bug.cgi?id=2281192 https://bugzilla.redhat.com/show_bug.cgi?id=2281202 https://bugzilla.redhat.com/show_bug.cgi?id=2281207 https://bugzilla.redhat.com/show_bug.cgi?id=2281211 https://bugzilla.redhat.com/show_bug.cgi?id=2281215 https://bugzilla.redhat.com/show_bug.cgi?id=2281217 https://bugzilla.redhat.com/show_bug.cgi?id=2281219 https://bugzilla.redhat.com/show_bug.cgi?id=2281221 https://bugzilla.redhat.com/show_bug.cgi?id=2281225 https://bugzilla.redhat.com/show_bug.cgi?id=2281235 https://bugzilla.redhat.com/show_bug.cgi?id=2281243 https://bugzilla.redhat.com/show_bug.cgi?id=2281251 https://bugzilla.redhat.com/show_bug.cgi?id=2281253 https://bugzilla.redhat.com/show_bug.cgi?id=2281255 https://bugzilla.redhat.com/show_bug.cgi?id=2281268 https://bugzilla.redhat.com/show_bug.cgi?id=2281276 https://bugzilla.redhat.com/show_bug.cgi?id=2281282 https://bugzilla.redhat.com/show_bug.cgi?id=2281286 https://bugzilla.redhat.com/show_bug.cgi?id=2281288 https://bugzilla.redhat.com/show_bug.cgi?id=2281290 https://bugzilla.redhat.com/show_bug.cgi?id=2281303 https://bugzilla.redhat.com/show_bug.cgi?id=2281305 https://bugzilla.redhat.com/show_bug.cgi?id=2281311 https://bugzilla.redhat.com/show_bug.cgi?id=2281317 https://bugzilla.redhat.com/show_bug.cgi?id=2281324 https://bugzilla.redhat.com/show_bug.cgi?id=2281326 https://bugzilla.redhat.com/show_bug.cgi?id=2281332 https://bugzilla.redhat.com/show_bug.cgi?id=2281336 https://bugzilla.redhat.com/show_bug.cgi?id=2281356 https://bugzilla.redhat.com/show_bug.cgi?id=2281358 https://bugzilla.redhat.com/show_bug.cgi?id=2281360 https://bugzilla.redhat.com/show_bug.cgi?id=2281362 https://bugzilla.redhat.com/show_bug.cgi?id=2281510 https://bugzilla.redhat.com/show_bug.cgi?id=2281517 https://bugzilla.redhat.com/show_bug.cgi?id=2281519 https://bugzilla.redhat.com/show_bug.cgi?id=2281523 https://bugzilla.redhat.com/show_bug.cgi?id=2281526 https://bugzilla.redhat.com/show_bug.cgi?id=2281634 https://bugzilla.redhat.com/show_bug.cgi?id=2281636 https://bugzilla.redhat.com/show_bug.cgi?id=2281645 https://bugzilla.redhat.com/show_bug.cgi?id=2281651 https://bugzilla.redhat.com/show_bug.cgi?id=2281655 https://bugzilla.redhat.com/show_bug.cgi?id=2281664 https://bugzilla.redhat.com/show_bug.cgi?id=2281679 https://bugzilla.redhat.com/show_bug.cgi?id=2281684 https://bugzilla.redhat.com/show_bug.cgi?id=2281693 https://bugzilla.redhat.com/show_bug.cgi?id=2281697 https://bugzilla.redhat.com/show_bug.cgi?id=2281713 https://bugzilla.redhat.com/show_bug.cgi?id=2281718 https://bugzilla.redhat.com/show_bug.cgi?id=2281720 https://bugzilla.redhat.com/show_bug.cgi?id=2281725 https://bugzilla.redhat.com/show_bug.cgi?id=2281736 https://bugzilla.redhat.com/show_bug.cgi?id=2281742 https://bugzilla.redhat.com/show_bug.cgi?id=2281752 https://bugzilla.redhat.com/show_bug.cgi?id=2281754 https://bugzilla.redhat.com/show_bug.cgi?id=2281758 https://bugzilla.redhat.com/show_bug.cgi?id=2281760 https://bugzilla.redhat.com/show_bug.cgi?id=2281762 https://bugzilla.redhat.com/show_bug.cgi?id=2281763 https://bugzilla.redhat.com/show_bug.cgi?id=2281769 https://bugzilla.redhat.com/show_bug.cgi?id=2281773 https://bugzilla.redhat.com/show_bug.cgi?id=2281781 https://bugzilla.redhat.com/show_bug.cgi?id=2281783 https://bugzilla.redhat.com/show_bug.cgi?id=2281786 https://bugzilla.redhat.com/show_bug.cgi?id=2281807 https://bugzilla.redhat.com/show_bug.cgi?id=2281811 https://bugzilla.redhat.com/show_bug.cgi?id=2281817 https://bugzilla.redhat.com/show_bug.cgi?id=2281819 https://bugzilla.redhat.com/show_bug.cgi?id=2281833 https://bugzilla.redhat.com/show_bug.cgi?id=2281843 https://bugzilla.redhat.com/show_bug.cgi?id=2281863 https://bugzilla.redhat.com/show_bug.cgi?id=2281872 https://bugzilla.redhat.com/show_bug.cgi?id=2281884 https://bugzilla.redhat.com/show_bug.cgi?id=2281891 https://bugzilla.redhat.com/show_bug.cgi?id=2281923 https://bugzilla.redhat.com/show_bug.cgi?id=2281927 https://bugzilla.redhat.com/show_bug.cgi?id=2281933 https://bugzilla.redhat.com/show_bug.cgi?id=2281938 https://bugzilla.redhat.com/show_bug.cgi?id=2281942 https://bugzilla.redhat.com/show_bug.cgi?id=2281989 https://bugzilla.redhat.com/show_bug.cgi?id=2282088 https://bugzilla.redhat.com/show_bug.cgi?id=2282302 https://bugzilla.redhat.com/show_bug.cgi?id=2282304 https://bugzilla.redhat.com/show_bug.cgi?id=2282354 https://bugzilla.redhat.com/show_bug.cgi?id=2282356 https://bugzilla.redhat.com/show_bug.cgi?id=2282366 https://bugzilla.redhat.com/show_bug.cgi?id=2282612 https://bugzilla.redhat.com/show_bug.cgi?id=2282622 https://bugzilla.redhat.com/show_bug.cgi?id=2282623 https://bugzilla.redhat.com/show_bug.cgi?id=2282637 https://bugzilla.redhat.com/show_bug.cgi?id=2282640 https://bugzilla.redhat.com/show_bug.cgi?id=2282641 https://bugzilla.redhat.com/show_bug.cgi?id=2282646 https://bugzilla.redhat.com/show_bug.cgi?id=2282652 https://bugzilla.redhat.com/show_bug.cgi?id=2282653 https://bugzilla.redhat.com/show_bug.cgi?id=2282655 https://bugzilla.redhat.com/show_bug.cgi?id=2282670 https://bugzilla.redhat.com/show_bug.cgi?id=2282676 https://bugzilla.redhat.com/show_bug.cgi?id=2282679 https://bugzilla.redhat.com/show_bug.cgi?id=2282680 https://bugzilla.redhat.com/show_bug.cgi?id=2282690 https://bugzilla.redhat.com/show_bug.cgi?id=2282740 https://bugzilla.redhat.com/show_bug.cgi?id=2282741 https://bugzilla.redhat.com/show_bug.cgi?id=2282742 https://bugzilla.redhat.com/show_bug.cgi?id=2282743 https://bugzilla.redhat.com/show_bug.cgi?id=2282744 https://bugzilla.redhat.com/show_bug.cgi?id=2282745 https://bugzilla.redhat.com/show_bug.cgi?id=2282746 https://bugzilla.redhat.com/show_bug.cgi?id=2282748 https://bugzilla.redhat.com/show_bug.cgi?id=2282757 https://bugzilla.redhat.com/show_bug.cgi?id=2282762 https://bugzilla.redhat.com/show_bug.cgi?id=2282763 https://bugzilla.redhat.com/show_bug.cgi?id=2282772 https://bugzilla.redhat.com/show_bug.cgi?id=2282787 https://bugzilla.redhat.com/show_bug.cgi?id=2282901 https://bugzilla.redhat.com/show_bug.cgi?id=2282904 https://bugzilla.redhat.com/show_bug.cgi?id=2282918 https://bugzilla.redhat.com/show_bug.cgi?id=2282920 https://bugzilla.redhat.com/show_bug.cgi?id=2282950 https://bugzilla.redhat.com/show_bug.cgi?id=2283448 https://bugzilla.redhat.com/show_bug.cgi?id=2283786 https://bugzilla.redhat.com/show_bug.cgi?id=2284265 https://bugzilla.redhat.com/show_bug.cgi?id=2284269 https://bugzilla.redhat.com/show_bug.cgi?id=2284273 https://bugzilla.redhat.com/show_bug.cgi?id=2284277 https://bugzilla.redhat.com/show_bug.cgi?id=2284295 https://bugzilla.redhat.com/show_bug.cgi?id=2284410 https://bugzilla.redhat.com/show_bug.cgi?id=2284413 https://bugzilla.redhat.com/show_bug.cgi?id=2284427 https://bugzilla.redhat.com/show_bug.cgi?id=2284465 https://bugzilla.redhat.com/show_bug.cgi?id=2284468 https://bugzilla.redhat.com/show_bug.cgi?id=2284477 https://bugzilla.redhat.com/show_bug.cgi?id=2284488 https://bugzilla.redhat.com/show_bug.cgi?id=2284490 https://bugzilla.redhat.com/show_bug.cgi?id=2284494 https://bugzilla.redhat.com/show_bug.cgi?id=2284500 https://bugzilla.redhat.com/show_bug.cgi?id=2284502 https://bugzilla.redhat.com/show_bug.cgi?id=2284515 https://bugzilla.redhat.com/show_bug.cgi?id=2284519 https://bugzilla.redhat.com/show_bug.cgi?id=2284539 https://bugzilla.redhat.com/show_bug.cgi?id=2284545 https://bugzilla.redhat.com/show_bug.cgi?id=2284556 https://bugzilla.redhat.com/show_bug.cgi?id=2284567 https://bugzilla.redhat.com/show_bug.cgi?id=2284583 https://bugzilla.redhat.com/show_bug.cgi?id=2284586 https://bugzilla.redhat.com/show_bug.cgi?id=2284628 https://bugzilla.redhat.com/show_bug.cgi?id=2284634 https://bugzilla.redhat.com/show_bug.cgi?id=2290407 https://bugzilla.redhat.com/show_bug.cgi?id=2290408 https://bugzilla.redhat.com/show_bug.cgi?id=2292329 https://bugzilla.redhat.com/show_bug.cgi?id=2293000 https://bugzilla.redhat.com/show_bug.cgi?id=2293003 https://bugzilla.redhat.com/show_bug.cgi?id=2293329 https://bugzilla.redhat.com/show_bug.cgi?id=2293359 https://bugzilla.redhat.com/show_bug.cgi?id=2293361 https://bugzilla.redhat.com/show_bug.cgi?id=2293365 https://bugzilla.redhat.com/show_bug.cgi?id=2293367 https://bugzilla.redhat.com/show_bug.cgi?id=2293371 https://bugzilla.redhat.com/show_bug.cgi?id=2293408 https://bugzilla.redhat.com/show_bug.cgi?id=2293444 https://bugzilla.redhat.com/show_bug.cgi?id=2293639 https://bugzilla.redhat.com/show_bug.cgi?id=2293656 https://bugzilla.redhat.com/show_bug.cgi?id=2293684 https://bugzilla.redhat.com/show_bug.cgi?id=2293693 https://bugzilla.redhat.com/show_bug.cgi?id=2293696 https://bugzilla.redhat.com/show_bug.cgi?id=2293698 https://bugzilla.redhat.com/show_bug.cgi?id=2293700 https://bugzilla.redhat.com/show_bug.cgi?id=2294223 https://bugzilla.redhat.com/show_bug.cgi?id=2294268 https://bugzilla.redhat.com/show_bug.cgi?id=2294274 https://bugzilla.redhat.com/show_bug.cgi?id=2294313 https://bugzilla.redhat.com/show_bug.cgi?id=2296059 https://bugzilla.redhat.com/show_bug.cgi?id=2296064 https://bugzilla.redhat.com/show_bug.cgi?id=2296066 https://bugzilla.redhat.com/show_bug.cgi?id=2296278 https://bugzilla.redhat.com/show_bug.cgi?id=2296383 https://bugzilla.redhat.com/show_bug.cgi?id=2297057 https://bugzilla.redhat.com/show_bug.cgi?id=2297061 https://bugzilla.redhat.com/show_bug.cgi?id=2297469 https://bugzilla.redhat.com/show_bug.cgi?id=2297470 https://bugzilla.redhat.com/show_bug.cgi?id=2297471 https://bugzilla.redhat.com/show_bug.cgi?id=2297473 https://bugzilla.redhat.com/show_bug.cgi?id=2297475 https://bugzilla.redhat.com/show_bug.cgi?id=2297480 https://bugzilla.redhat.com/show_bug.cgi?id=2297487 https://bugzilla.redhat.com/show_bug.cgi?id=2297490 https://bugzilla.redhat.com/show_bug.cgi?id=2297491 https://bugzilla.redhat.com/show_bug.cgi?id=2297497 https://bugzilla.redhat.com/show_bug.cgi?id=2297503 https://bugzilla.redhat.com/show_bug.cgi?id=2297506 https://bugzilla.redhat.com/show_bug.cgi?id=2297507 https://bugzilla.redhat.com/show_bug.cgi?id=2297508 https://bugzilla.redhat.com/show_bug.cgi?id=2297509 https://bugzilla.redhat.com/show_bug.cgi?id=2297514 https://bugzilla.redhat.com/show_bug.cgi?id=2297524 https://bugzilla.redhat.com/show_bug.cgi?id=2297529 https://bugzilla.redhat.com/show_bug.cgi?id=2297532 https://bugzilla.redhat.com/show_bug.cgi?id=2297549 https://bugzilla.redhat.com/show_bug.cgi?id=2297550 https://bugzilla.redhat.com/show_bug.cgi?id=2297551 https://bugzilla.redhat.com/show_bug.cgi?id=2297572 https://bugzilla.redhat.com/show_bug.cgi?id=2297573 https://bugzilla.redhat.com/show_bug.cgi?id=2297581 https://bugzilla.redhat.com/show_bug.cgi?id=2297585 https://bugzilla.redhat.com/show_bug.cgi?id=2297702 https://bugzilla.redhat.com/show_bug.cgi?id=2297706 https://bugzilla.redhat.com/show_bug.cgi?id=2297909 https://bugzilla.redhat.com/show_bug.cgi?id=2298079 https://bugzilla.redhat.com/show_bug.cgi?id=2298140 https://bugzilla.redhat.com/show_bug.cgi?id=2298817 https://bugzilla.redhat.com/show_bug.cgi?id=2299452 https://bugzilla.redhat.com/show_bug.cgi?id=2300363 https://bugzilla.redhat.com/show_bug.cgi?id=2300398 https://bugzilla.redhat.com/show_bug.cgi?id=2300407 https://bugzilla.redhat.com/show_bug.cgi?id=2300408 https://bugzilla.redhat.com/show_bug.cgi?id=2300412 https://bugzilla.redhat.com/show_bug.cgi?id=2300422 https://bugzilla.redhat.com/show_bug.cgi?id=2300430 https://bugzilla.redhat.com/show_bug.cgi?id=2300431 https://bugzilla.redhat.com/show_bug.cgi?id=2300432 https://bugzilla.redhat.com/show_bug.cgi?id=2300434 https://bugzilla.redhat.com/show_bug.cgi?id=2300438 https://bugzilla.redhat.com/show_bug.cgi?id=2300440 https://bugzilla.redhat.com/show_bug.cgi?id=2300454 https://bugzilla.redhat.com/show_bug.cgi?id=2300456 https://bugzilla.redhat.com/show_bug.cgi?id=2300459 https://bugzilla.redhat.com/show_bug.cgi?id=2300480 https://bugzilla.redhat.com/show_bug.cgi?id=2300481 https://bugzilla.redhat.com/show_bug.cgi?id=2300486 https://bugzilla.redhat.com/show_bug.cgi?id=2300487 https://bugzilla.redhat.com/show_bug.cgi?id=2300488 https://bugzilla.redhat.com/show_bug.cgi?id=2300489 https://bugzilla.redhat.com/show_bug.cgi?id=2300490 https://bugzilla.redhat.com/show_bug.cgi?id=2300508 https://bugzilla.redhat.com/show_bug.cgi?id=2300516 https://bugzilla.redhat.com/show_bug.cgi?id=2300533 https://bugzilla.redhat.com/show_bug.cgi?id=2300552 https://bugzilla.redhat.com/show_bug.cgi?id=2301464 https://bugzilla.redhat.com/show_bug.cgi?id=2301477 https://bugzilla.redhat.com/show_bug.cgi?id=2301488 https://bugzilla.redhat.com/show_bug.cgi?id=2301489 https://bugzilla.redhat.com/show_bug.cgi?id=2301490 https://bugzilla.redhat.com/show_bug.cgi?id=2301497 https://bugzilla.redhat.com/show_bug.cgi?id=2301506 https://bugzilla.redhat.com/show_bug.cgi?id=2301522 https://bugzilla.redhat.com/show_bug.cgi?id=2301530 https://bugzilla.redhat.com/show_bug.cgi?id=2301544 https://bugzilla.redhat.com/show_bug.cgi?id=2303077 https://bugzilla.redhat.com/show_bug.cgi?id=2304187 https://bugzilla.redhat.com/show_bug.cgi?id=2306363 https://bugzilla.redhat.com/show_bug.cgi?id=2307861 https://bugzilla.redhat.com/show_bug.cgi?id=2307865 https://bugzilla.redhat.com/show_bug.cgi?id=2307884 https://bugzilla.redhat.com/show_bug.cgi?id=2309273 https://bugzilla.redhat.com/show_bug.cgi?id=2309791 https://bugzilla.redhat.com/show_bug.cgi?id=2309796 https://bugzilla.redhat.com/show_bug.cgi?id=2309801 https://bugzilla.redhat.com/show_bug.cgi?id=2309847 https://bugzilla.redhat.com/show_bug.cgi?id=2309868 https://issues.redhat.com/browse/RHEL-17714 https://issues.redhat.com/browse/RHEL-23575 https://issues.redhat.com/browse/RHEL-26081 https://issues.redhat.com/browse/RHEL-29437 https://issues.redhat.com/browse/RHEL-31876 https://issues.redhat.com/browse/RHEL-32199 https://issues.redhat.com/browse/RHEL-35853 https://issues.redhat.com/browse/RHEL-36182 https://issues.redhat.com/browse/RHEL-36224 https://issues.redhat.com/browse/RHEL-45158 https://issues.redhat.com/browse/RHEL-7990 https://issues.redhat.com/browse/RHEL-9096 https://issues.redhat.com/browse/RHEL-9148 https://issues.redhat.com/browse/RHEL-9429