Action not permitted
Modal body text goes here.
CVE-2022-2585
Vulnerability from cvelistv5
Published
2024-01-08 17:38
Modified
2024-09-04 19:03
Severity ?
EPSS score ?
Summary
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
References
▼ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585 | Third Party Advisory | |
security@ubuntu.com | https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u | Mailing List, Patch | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-5564-1 | Third Party Advisory | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-5565-1 | Third Party Advisory | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-5566-1 | Third Party Advisory | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-5567-1 | Third Party Advisory | |
security@ubuntu.com | https://www.openwall.com/lists/oss-security/2022/08/09/7 | Mailing List |
Impacted products
▼ | Vendor | Product |
---|---|---|
The Linux Kernel Organization | linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:39:08.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2022/08/09/7" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://ubuntu.com/security/notices/USN-5565-1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-2585", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T17:22:39.159224Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:03:25.626Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "packageName": "linux", "platforms": [ "Linux" ], "product": "linux", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git", "vendor": "The Linux Kernel Organization", "versions": [ { "lessThan": "6.0~rc1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "An independent security researcher working with SSD Secure Disclosure" } ], "descriptions": [ { "lang": "en", "value": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T17:38:27.327Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "tags": [ "third-party-advisory" ], "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "tags": [ "issue-tracking" ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "tags": [ "third-party-advisory" ], "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "tags": [ "issue-tracking" ], "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" }, { "tags": [ "issue-tracking" ], "url": "https://www.openwall.com/lists/oss-security/2022/08/09/7" }, { "tags": [ "third-party-advisory" ], "url": "https://ubuntu.com/security/notices/USN-5565-1" } ] } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2022-2585", "datePublished": "2024-01-08T17:38:27.327Z", "dateReserved": "2022-07-29T21:59:31.316Z", "dateUpdated": "2024-09-04T19:03:25.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-2585\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2024-01-08T18:15:44.383\",\"lastModified\":\"2024-08-22T20:28:23.727\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 que al ejecutar desde un subproceso no l\u00edder, los temporizadores de CPU POSIX armados se dejaban en una lista pero se liberaban, lo que generaba un use-after-free.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.0,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7\",\"versionEndExcluding\":\"5.10.137\",\"matchCriteriaId\":\"674AABE4-BC3E-4530-9717-5DFE7AB70A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.61\",\"matchCriteriaId\":\"51861563-7F40-460F-82CD-2D3FBDAD6618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.18.18\",\"matchCriteriaId\":\"5B42E453-8837-49D0-A5EF-03F818A6DC11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19\",\"versionEndExcluding\":\"5.19.2\",\"matchCriteriaId\":\"A1A2A5A5-4598-4D7E-BA07-4660398D6C8F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"359012F1-2C63-415A-88B8-6726A87830DE\"}]}]}],\"references\":[{\"url\":\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://ubuntu.com/security/notices/USN-5564-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ubuntu.com/security/notices/USN-5565-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ubuntu.com/security/notices/USN-5566-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ubuntu.com/security/notices/USN-5567-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2022/08/09/7\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\"]}]}}" } }
icsa-23-166-10
Vulnerability from csaf_cisa
Published
2023-06-13 00:00
Modified
2023-06-13 00:00
Summary
Siemens SIMATIC S7-1500 TM MFP BIOS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.
Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locating control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimizing network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locating control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, using more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "other", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-10 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-10.json" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-10 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC S7-1500 TM MFP BIOS", "tracking": { "current_release_date": "2023-06-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1" } }, "id": "ICSA-23-166-10", "initial_release_date": "2023-06-13T00:00:00.000000Z", "revision_history": [ { "date": "2023-06-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC S7-1500 TM MFP - BIOS", "product_id": "1" } } ], "category": "product_name", "name": "SIMATIC S7-1500 TM MFP - BIOS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-20269", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-20269" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28831", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-28831" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-42373", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42373" }, { "cve": "CVE-2021-42374", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42374" }, { "cve": "CVE-2021-42375", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42375" }, { "cve": "CVE-2021-42376", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42376" }, { "cve": "CVE-2021-42377", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42377" }, { "cve": "CVE-2021-42378", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42378" }, { "cve": "CVE-2021-42379", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42379" }, { "cve": "CVE-2021-42380", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42380" }, { "cve": "CVE-2021-42381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42381" }, { "cve": "CVE-2021-42382", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42382" }, { "cve": "CVE-2021-42383", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42383" }, { "cve": "CVE-2021-42384", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42384" }, { "cve": "CVE-2021-42385", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42385" }, { "cve": "CVE-2021-42386", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42386" }, { "cve": "CVE-2022-1882", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1882" }, { "cve": "CVE-2022-2585", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2585" }, { "cve": "CVE-2022-2588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2905", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2905" }, { "cve": "CVE-2022-3028", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3586" }, { "cve": "CVE-2022-4378", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4378" }, { "cve": "CVE-2022-4662", "cwe": { "id": "CWE-455", "name": "Non-exit on Failed Initialization" }, "notes": [ { "category": "summary", "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4662" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-21233", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21233" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-28391", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record\u0027s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal\u0027s colors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-28391" }, { "cve": "CVE-2022-30065", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-30065" }, { "cve": "CVE-2022-39188", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39190", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39190" }, { "cve": "CVE-2022-40307", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-40307" }, { "cve": "CVE-2022-41222", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41222" }, { "cve": "CVE-2022-42703", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42703" }, { "cve": "CVE-2023-0179", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0179" }, { "cve": "CVE-2023-0394", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-1073", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "1" ] }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-1073" } ] }
rhsa-2022_7318
Vulnerability from csaf_redhat
Published
2022-11-02 14:40
Modified
2024-11-15 13:15
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653)
* execve exit tracepoint not called (BZ#2106661)
* Matrox black screen on VGA output on some systems. (BZ#2112017)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129)
* watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857)
* Update cifs to 5.16 (BZ#2127858)
* Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859)
* vfio zero page mappings fail after 2M instances (BZ#2128791)
* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970)
Enhancement(s):
* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)\n\n* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095653)\n\n* execve exit tracepoint not called (BZ#2106661)\n\n* Matrox black screen on VGA output on some systems. (BZ#2112017)\n\n* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (BZ#2121129)\n\n* watchdog BUG: soft lockup - CPU#30 stuck for 34s! [swapper/30:0] (BZ#2127857)\n\n* Update cifs to 5.16 (BZ#2127858)\n\n* Bad page state in process qemu-kvm pfn:68a74600 (BZ#2127859)\n\n* vfio zero page mappings fail after 2M instances (BZ#2128791)\n\n* The kernel needs to offer a way to reseed the Crypto DRBG and atomically extract random numbers from it (part 2) (BZ#2128970)\n\nEnhancement(s):\n\n* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129453)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7318", "url": "https://access.redhat.com/errata/RHSA-2022:7318" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2085300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300" }, { "category": "external", "summary": "2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7318.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T13:15:42+00:00", "generator": { "date": "2024-11-15T13:15:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:7318", "initial_release_date": "2022-11-02T14:40:30+00:00", "revision_history": [ { "date": "2022-11-02T14:40:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-02T14:40:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:15:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.30.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "product": { "name": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "product_id": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.30.1.el9_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.30.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product": { "name": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product_id": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.30.1.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.30.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "product": { "name": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "product_id": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.30.1.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.30.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.30.1.el9_0.s390x", "product": { "name": "perf-0:5.14.0-70.30.1.el9_0.s390x", "product_id": "perf-0:5.14.0-70.30.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.30.1.el9_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:5.14.0-70.30.1.el9_0.src", "product": { "name": "kernel-0:5.14.0-70.30.1.el9_0.src", "product_id": "kernel-0:5.14.0-70.30.1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.30.1.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "product": { "name": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "product_id": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.30.1.el9_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "product": { "name": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "product_id": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.30.1.el9_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2585", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2114874" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: posix cpu timer use-after-free may lead to local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2585" }, { "category": "external", "summary": "RHBZ#2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2585" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u", "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" } ], "release_date": "2022-08-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:40:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:7318" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: posix cpu timer use-after-free may lead to local privilege escalation" }, { "cve": "CVE-2022-30594", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085300" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "RHBZ#2085300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:40:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:7318" }, { "category": "workaround", "details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.30.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.30.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.30.1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option" } ] }
rhsa-2022_7330
Vulnerability from csaf_redhat
Published
2022-11-02 14:35
Modified
2024-11-06 01:54
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7330", "url": "https://access.redhat.com/errata/RHSA-2022:7330" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7330.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-06T01:54:43+00:00", "generator": { "date": "2024-11-06T01:54:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:7330", "initial_release_date": "2022-11-02T14:35:48+00:00", "revision_history": [ { "date": "2022-11-02T14:35:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-02T14:35:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:54:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-4.el9_0?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-3.el9_0?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-3.el9_0?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-2.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-4.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-4.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-4.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-3.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-2.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-2.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-2.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-4.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-4.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-4.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-3.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1@1-2.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debugsource@1-2.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_26_1-debuginfo@1-2.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2585", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2114874" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: posix cpu timer use-after-free may lead to local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2585" }, { "category": "external", "summary": "RHBZ#2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2585" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u", "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" } ], "release_date": "2022-08-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:35:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7330" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-4.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-3.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_26_1-debugsource-0:1-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: posix cpu timer use-after-free may lead to local privilege escalation" } ] }
rhsa-2022_7319
Vulnerability from csaf_redhat
Published
2022-11-02 14:33
Modified
2024-11-15 13:15
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update RT source tree to the latest RHEL-9.0.z4 Batch (BZ#2123498)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)\n\n* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update RT source tree to the latest RHEL-9.0.z4 Batch (BZ#2123498)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7319", "url": "https://access.redhat.com/errata/RHSA-2022:7319" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2085300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300" }, { "category": "external", "summary": "2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7319.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T13:15:44+00:00", "generator": { "date": "2024-11-15T13:15:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:7319", "initial_release_date": "2022-11-02T14:33:35+00:00", "revision_history": [ { "date": "2022-11-02T14:33:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-02T14:33:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T13:15:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "product": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "product_id": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.30.1.rt21.102.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.30.1.rt21.102.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2585", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2114874" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: posix cpu timer use-after-free may lead to local privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2585" }, { "category": "external", "summary": "RHBZ#2114874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2585" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2585" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u", "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" } ], "release_date": "2022-08-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:33:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7319" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: posix cpu timer use-after-free may lead to local privilege escalation" }, { "cve": "CVE-2022-30594", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085300" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag, possibly disabling seccomp.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "RHBZ#2085300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30594" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-02T14:33:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7319" }, { "category": "workaround", "details": "If ptrace is not required, ptrace can be disabled in multiple ways.\n\n 1. SELinux policy.\n\n # setsebool -P deny_ptrace on\n\n 2. Kernel sysctl.\n\n # sysctl -w kernel.yama.ptrace_scope=3\n\n Or to make persistent , create\n\n /etc/sysctl.d/99-yama-ptrace_scope.conf\n\n kernel.yama.ptrace_scope=3\n\nIf you need further assistance, see the KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.30.1.rt21.102.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option" } ] }
gsd-2022-2585
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-2585", "id": "GSD-2022-2585", "references": [ "https://www.debian.org/security/2022/dsa-5207", "https://www.suse.com/security/cve/CVE-2022-2585.html", "https://ubuntu.com/security/CVE-2022-2585", "https://advisories.mageia.org/CVE-2022-2585.html", "https://access.redhat.com/errata/RHSA-2022:7318", "https://access.redhat.com/errata/RHSA-2022:7319", "https://access.redhat.com/errata/RHSA-2022:7330" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-2585" ], "details": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.", "id": "GSD-2022-2585", "modified": "2023-12-13T01:19:20.007377Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "ID": "CVE-2022-2585", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "6.0~rc1" } ] } } ] }, "vendor_name": "The Linux Kernel Organization" } ] } }, "credits": [ { "lang": "en", "value": "An independent security researcher working with SSD Secure Disclosure" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-416", "lang": "eng", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://ubuntu.com/security/notices/USN-5566-1", "refsource": "MISC", "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "name": "https://ubuntu.com/security/notices/USN-5564-1", "refsource": "MISC", "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "name": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "refsource": "MISC", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "name": "https://ubuntu.com/security/notices/USN-5567-1", "refsource": "MISC", "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "name": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u", "refsource": "MISC", "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" }, { "name": "https://www.openwall.com/lists/oss-security/2022/08/09/7", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2022/08/09/7" }, { "name": "https://ubuntu.com/security/notices/USN-5565-1", "refsource": "MISC", "url": "https://ubuntu.com/security/notices/USN-5565-1" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "83F78277-6AE5-49BE-B412-E200DE9C0AB2", "versionEndExcluding": "6.0", "versionStartIncluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "It was discovered that when exec\u0027ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free." }, { "lang": "es", "value": "Se descubri\u00f3 que al ejecutar desde un subproceso no l\u00edder, los temporizadores de CPU POSIX armados se dejaban en una lista pero se liberaban, lo que generaba un use-after-free." } ], "id": "CVE-2022-2585", "lastModified": "2024-01-19T17:14:35.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 4.2, "source": "security@ubuntu.com", "type": "Secondary" } ] }, "published": "2024-01-08T18:15:44.383", "references": [ { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List", "Patch" ], "url": "https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/notices/USN-5565-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "source": "security@ubuntu.com", "tags": [ "Mailing List" ], "url": "https://www.openwall.com/lists/oss-security/2022/08/09/7" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "security@ubuntu.com", "type": "Secondary" } ] } } } }
wid-sec-w-2022-0997
Vulnerability from csaf_certbund
Published
2022-08-09 22:00
Modified
2024-05-07 22:00
Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0997 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0997.json" }, { "category": "self", "summary": "WID-SEC-2022-0997 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0997" }, { "category": "external", "summary": "Mailing list OSS Security vom 2022-08-09", "url": "https://seclists.org/oss-sec/2022/q3/114" }, { "category": "external", "summary": "Mailing list OSS Security vom 2022-08-09", "url": "https://seclists.org/oss-sec/2022/q3/115" }, { "category": "external", "summary": "Mailing list OSS Security vom 2022-08-09", "url": "https://seclists.org/oss-sec/2022/q3/116" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5557-1 vom 2022-08-09", "url": "https://ubuntu.com/security/notices/USN-5557-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5564-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5564-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5566-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5566-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5560-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5560-1" }, { "category": "external", "summary": "ORACLE OVMSA-2022-0022 vom 2022-08-10", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2022-August/001057.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5565-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5565-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5560-2 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5560-2" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9694 vom 2022-08-09", "url": "https://linux.oracle.com/errata/ELSA-2022-9694.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5562-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5562-1" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9692 vom 2022-08-09", "url": "https://linux.oracle.com/errata/ELSA-2022-9692.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5567-1 vom 2022-08-10", "url": "https://ubuntu.com/security/notices/USN-5567-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2803-1 vom 2022-08-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9710 vom 2022-08-15", "url": "http://linux.oracle.com/errata/ELSA-2022-9710.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5207 vom 2022-08-15", "url": "https://lists.debian.org/debian-security-announce/2022/msg00176.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9709 vom 2022-08-15", "url": "http://linux.oracle.com/errata/ELSA-2022-9709.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5582-1 vom 2022-08-25", "url": "https://ubuntu.com/security/notices/USN-5582-1" }, { "category": "external", "summary": "Exploit auf OSS-Security vom 2022-08-29", "url": "https://www.openwall.com/lists/oss-security/2022/08/29/5" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5588-1 vom 2022-08-30", "url": "https://ubuntu.com/security/notices/USN-5588-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3072-1 vom 2022-09-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9761 vom 2022-09-07", "url": "http://linux.oracle.com/errata/ELSA-2022-9761.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3108-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3102 vom 2022-09-11", "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3274-1 vom 2022-09-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2022-092 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2022-092.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3265-1 vom 2022-09-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012231.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-035 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-035.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3263-1 vom 2022-09-15", "url": "http://www.auscert.org.au/bulletins/ESB-2022.4574" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1838 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1838.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3264-1 vom 2022-09-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3282-1 vom 2022-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9787 vom 2022-09-16", "url": "https://linux.oracle.com/errata/ELSA-2022-9787.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9788 vom 2022-09-16", "url": "https://linux.oracle.com/errata/ELSA-2022-9788.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3294-1 vom 2022-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3288-1 vom 2022-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3291-1 vom 2022-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3293-1 vom 2022-09-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" }, { "category": "external", "summary": "Siemens Security Bulletin SSB-439005 vom 2022-09-13", "url": "https://cert-portal.siemens.com/productcert/pdf/ssb-439005.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6551 vom 2022-09-19", "url": "https://access.redhat.com/errata/RHSA-2022:6551" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9829 vom 2022-09-21", "url": "https://linux.oracle.com/errata/ELSA-2022-9829.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9830 vom 2022-09-21", "url": "https://linux.oracle.com/errata/ELSA-2022-9830.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9828 vom 2022-09-21", "url": "https://linux.oracle.com/errata/ELSA-2022-9828.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9827 vom 2022-09-21", "url": "https://linux.oracle.com/errata/ELSA-2022-9827.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3408-1 vom 2022-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3422-1 vom 2022-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3450-1 vom 2022-09-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3131 vom 2022-10-03", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1852 vom 2022-10-11", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1852.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1636 vom 2022-10-11", "url": "https://alas.aws.amazon.com/ALAS-2022-1636.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6875 vom 2022-10-11", "url": "https://access.redhat.com/errata/RHSA-2022:6875" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6872 vom 2022-10-11", "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-150 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-150.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2022-020 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-020.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-036 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-036.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2022-008 vom 2022-10-14", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-008.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3585-1 vom 2022-10-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6978 vom 2022-10-18", "url": "https://access.redhat.com/errata/RHSA-2022:6978" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6991 vom 2022-10-18", "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6983 vom 2022-10-18", "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "category": "external", "summary": "Oracle Linux Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/linuxbulletinoct2022.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3609-1 vom 2022-10-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3704-1 vom 2022-10-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7110 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7146 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7171 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7171" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7134 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7137 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7173 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7173" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7110 vom 2022-10-26", "url": "http://linux.oracle.com/errata/ELSA-2022-7110.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3775-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3809-1 vom 2022-10-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3844-1 vom 2022-11-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7280 vom 2022-11-01", "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7279 vom 2022-11-01", "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7337 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7338 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7330 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7330" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7344 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7344" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7318 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7319 vom 2022-11-02", "url": "https://access.redhat.com/errata/RHSA-2022:7319" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7337 vom 2022-11-03", "url": "http://linux.oracle.com/errata/ELSA-2022-7337.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7216 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7216" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7318 vom 2022-11-04", "url": "https://linux.oracle.com/errata/ELSA-2022-7318.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-185 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-185.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7444 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7444" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7683 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7683" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6882 vom 2022-11-09", "url": "https://access.redhat.com/errata/RHSA-2022:6882" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7885 vom 2022-11-09", "url": "https://access.redhat.com/errata/RHSA-2022:7885" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7933 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4034-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4039-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4030-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4035-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4033-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4027-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4024-1 vom 2022-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9999 vom 2022-11-16", "url": "http://linux.oracle.com/errata/ELSA-2022-9999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4100-1 vom 2022-11-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4129-1 vom 2022-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4112-1 vom 2022-11-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4113-1 vom 2022-11-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8781" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2022-094 vom 2022-12-08", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2022-094.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2LIVEPATCH-2022-093 vom 2022-12-08", "url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2022-093.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8973 vom 2022-12-13", "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4617-1 vom 2022-12-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" }, { "category": "external", "summary": "IBM Security Bulletin 6963936 vom 2023-03-16", "url": "https://www.ibm.com/support/pages/node/6963936" }, { "category": "external", "summary": "IBM Security Bulletin 6967016 vom 2023-03-29", "url": "https://www.ibm.com/support/pages/node/6967016" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2458 vom 2023-06-28", "url": "https://oss.oracle.com/pipermail/el-errata/2023-June/014226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2023-2100 vom 2023-07-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2100.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1773 vom 2023-07-04", "url": "https://alas.aws.amazon.com/ALAS-2023-1773.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4022 vom 2023-07-11", "url": "https://access.redhat.com/errata/RHSA-2023:4022" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4023 vom 2023-07-11", "url": "https://access.redhat.com/errata/RHSA-2023:4023" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0120-1 vom 2024-01-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0117-1 vom 2024-01-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" }, { "category": "external", "summary": "Extreme Networks Security Advisory", "url": "https://extremeportal.force.com/ExtrArticleDetail?an=000108236" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0118-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0113-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" }, { "category": "external", "summary": "ExtremeNetworks Vulnerability Notice SA-2022-035 vom 2023-08-22", "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000108236" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0724 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0724" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-198 vom 2024-05-08", "url": "https://www.dell.com/support/kbdoc/000224827/dsa-2024-=" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2024-05-07T22:00:00.000+00:00", "generator": { "date": "2024-05-08T08:10:51.005+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0997", "initial_release_date": "2022-08-09T22:00:00.000+00:00", "revision_history": [ { "date": "2022-08-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu, ORACLE und Oracle Linux aufgenommen" }, { "date": "2022-08-14T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-15T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Debian aufgenommen" }, { "date": "2022-08-22T22:00:00.000+00:00", "number": "5", "summary": "Name \"DirtyCred\" f\u00fcr CVE-2022-2588 erg\u00e4nzt" }, { "date": "2022-08-24T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-29T22:00:00.000+00:00", "number": "7", "summary": "Exploit aufgenommen" }, { "date": "2022-08-30T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-09-05T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2022-09-11T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE und Amazon aufgenommen" }, { "date": "2022-09-15T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2022-09-18T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE und Siemens aufgenommen" }, { "date": "2022-09-19T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-09-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-27T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-10T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-10-11T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-13T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-17T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-18T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat und SUSE aufgenommen" }, { "date": "2022-10-24T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2022-11-02T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-16T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2022-11-20T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-08T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-12-13T23:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-26T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-03-16T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-07-02T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-03T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-08-10T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates aufgenommen" }, { "date": "2023-08-21T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von ExtremeNetworks aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "55" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "virtual", "product": { "name": "Dell NetWorker virtual", "product_id": "T034583", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:virtual" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c32.5", "product": { "name": "Extreme Networks ExtremeXOS \u003c32.5", "product_id": "T029263", "product_identification_helper": { "cpe": "cpe:/o:extremenetworks:extremexos:32.5" } } } ], "category": "product_name", "name": "ExtremeXOS" } ], "category": "vendor", "name": "Extreme Networks" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.4.3 FP9", "product": { "name": "IBM QRadar SIEM \u003c7.4.3 FP9", "product_id": "T026829", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4.3_fp9" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP4 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP4 IF01", "product_id": "T026982", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up4_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023657", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=3.16-rc1", "product": { "name": "Open Source Linux Kernel \u003e=3.16-rc1", "product_id": "T024265", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:3.16-rc1" } } }, { "category": "product_version_range", "name": "\u003e=2.6.12-rc2", "product": { "name": "Open Source Linux Kernel \u003e=2.6.12-rc2", "product_id": "T024266", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:2.6.12-rc2" } } }, { "category": "product_version_range", "name": "\u003e=5.7-rc1", "product": { "name": "Open Source Linux Kernel \u003e=5.7-rc1", "product_id": "T024267", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:5.7-rc1" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1500", "product": { "name": "Siemens SIMATIC S7 1500", "product_id": "T019436", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1500" } } } ], "category": "product_name", "name": "SIMATIC S7" } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2585", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Sie sind auf use-after-free Fehler in \"nf_tables\", \"cls_route\" und \"posix-cpu-timers\" zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Fehler ausnutzen, um seine Privilegien zu erweitern und m\u00f6glicherweise andere nicht spezifizierte Auswirkungen zu erzielen." } ], "product_status": { "known_affected": [ "T008027", "T029263", "67646", "T034583", "T004914", "T026829", "T019436", "T014381", "2951", "T002207", "T000126", "T023657", "398363", "T026982" ] }, "release_date": "2022-08-09T22:00:00Z", "title": "CVE-2022-2585" }, { "cve": "CVE-2022-2586", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Sie sind auf use-after-free Fehler in \"nf_tables\", \"cls_route\" und \"posix-cpu-timers\" zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Fehler ausnutzen, um seine Privilegien zu erweitern und m\u00f6glicherweise andere nicht spezifizierte Auswirkungen zu erzielen." } ], "product_status": { "known_affected": [ "T008027", "T029263", "67646", "T034583", "T004914", "T026829", "T019436", "T014381", "2951", "T002207", "T000126", "T023657", "398363", "T026982" ] }, "release_date": "2022-08-09T22:00:00Z", "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen im Linux-Kernel. Sie sind auf use-after-free Fehler in \"nf_tables\", \"cls_route\" und \"posix-cpu-timers\" zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Fehler ausnutzen, um seine Privilegien zu erweitern und m\u00f6glicherweise andere nicht spezifizierte Auswirkungen zu erzielen." } ], "product_status": { "known_affected": [ "T008027", "T029263", "67646", "T034583", "T004914", "T026829", "T019436", "T014381", "2951", "T002207", "T000126", "T023657", "398363", "T026982" ] }, "release_date": "2022-08-09T22:00:00Z", "title": "CVE-2022-2588" } ] }
wid-sec-w-2023-1432
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-22 22:00
Summary
Siemens SIMATIC S7: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json" }, { "category": "self", "summary": "WID-SEC-2023-1432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22", "url": "https://ubuntu.com/security/notices/USN-6187-1" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html" } ], "source_lang": "en-US", "title": "Siemens SIMATIC S7: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-22T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:48.504+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1432", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7 1500 TM MFP", "product": { "name": "Siemens SIMATIC S7 1500 TM MFP", "product_id": "T028071", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-26607", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-26607" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1077", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1073", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-1073" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0394", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0179", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0179" }, { "cve": "CVE-2022-47946", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-47946" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-47520", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-47520" }, { "cve": "CVE-2022-47518", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-47518" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42722", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42722" }, { "cve": "CVE-2022-42721", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42720", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42719", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42432", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42432" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41849", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41849" }, { "cve": "CVE-2022-41674", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41674" }, { "cve": "CVE-2022-4139", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4139" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-41222", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41222" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-39190", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-39190" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3633", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3633" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3625", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3625" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-36123", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36123" }, { "cve": "CVE-2022-3606", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3606" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3534", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3534" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-34918", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3435", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3303", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3303" }, { "cve": "CVE-2022-32296", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32296" }, { "cve": "CVE-2022-32250", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32250" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-3115", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3115" }, { "cve": "CVE-2022-3104", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3104" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30065", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30065" }, { "cve": "CVE-2022-2978", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2978" }, { "cve": "CVE-2022-2959", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2959" }, { "cve": "CVE-2022-2905", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2905" }, { "cve": "CVE-2022-28391", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28391" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2602", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2602" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2586", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2585", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2585" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-2327", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2327" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23218", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-23218" }, { "cve": "CVE-2022-2274", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21505", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21505" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-21166", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21125", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21123", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21123" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2078", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2078" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-20572", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-20572" }, { "cve": "CVE-2022-20566", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-20566" }, { "cve": "CVE-2022-20422", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20421", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-20421" }, { "cve": "CVE-2022-1882", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1882" }, { "cve": "CVE-2022-1852", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1473", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1473" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1434", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1343", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1012", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1012" }, { "cve": "CVE-2022-0171", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-0171" }, { "cve": "CVE-2021-42386", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42386" }, { "cve": "CVE-2021-42385", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42385" }, { "cve": "CVE-2021-42384", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42384" }, { "cve": "CVE-2021-42383", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42383" }, { "cve": "CVE-2021-42382", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42382" }, { "cve": "CVE-2021-42381", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42381" }, { "cve": "CVE-2021-42380", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42380" }, { "cve": "CVE-2021-42379", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42379" }, { "cve": "CVE-2021-42378", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42378" }, { "cve": "CVE-2021-42377", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42377" }, { "cve": "CVE-2021-42376", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42376" }, { "cve": "CVE-2021-42375", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42375" }, { "cve": "CVE-2021-42374", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42374" }, { "cve": "CVE-2021-42373", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-42373" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-3998", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-3998" }, { "cve": "CVE-2021-38604", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-38604" }, { "cve": "CVE-2021-3759", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-3759" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33574", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-33574" }, { "cve": "CVE-2021-3326", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-3326" }, { "cve": "CVE-2021-28831", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-28831" }, { "cve": "CVE-2021-27645", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-27645" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2020-29562", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2020-29562" }, { "cve": "CVE-2020-27618", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2020-27618" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2020-1752" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2020-10029" }, { "cve": "CVE-2019-25013", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2019-25013" }, { "cve": "CVE-2018-13405", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2018-13405" }, { "cve": "CVE-2016-10228", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2016-10228" } ] }
ssa-831302
Vulnerability from csaf_siemens
Published
2023-06-13 00:00
Modified
2024-04-09 00:00
Summary
SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0
Notes
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.
Siemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP - BIOS and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-831302.json" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-831302.pdf" }, { "category": "self", "summary": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-831302.txt" } ], "title": "SSA-831302: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP before V1.3.0", "tracking": { "current_release_date": "2024-04-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-831302", "initial_release_date": "2023-06-13T00:00:00Z", "revision_history": [ { "date": "2023-06-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-09-12T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2022-1015, CVE-2023-2898, CVE-2023-31248, CVE-2023-3390, CVE-2023-35001, CVE-2023-3610, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004, CVE-2023-4015, CVE-2023-4128, CVE-2023-4147, CVE-2023-4273" }, { "date": "2023-11-14T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-4527, CVE-2023-4806, CVE-2023-4911, CVE-2023-5156" }, { "date": "2023-12-12T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2021-44879, CVE-2023-45863" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added fix for SIMATIC S7-1500 TM MFP - BIOS" } ], "status": "interim", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.3.0", "product": { "name": "SIMATIC S7-1500 TM MFP - BIOS", "product_id": "1" } } ], "category": "product_name", "name": "SIMATIC S7-1500 TM MFP - BIOS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10228", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2016-10228" }, { "cve": "CVE-2019-25013", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2019-25013" }, { "cve": "CVE-2020-1752", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-1752" }, { "cve": "CVE-2020-10029", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-10029" }, { "cve": "CVE-2020-27618", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-27618" }, { "cve": "CVE-2020-29562", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29562" }, { "cve": "CVE-2021-3326", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3326" }, { "cve": "CVE-2021-3998", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3998" }, { "cve": "CVE-2021-3999", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3999" }, { "cve": "CVE-2021-20269", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-20269" }, { "cve": "CVE-2021-27645", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-27645" }, { "cve": "CVE-2021-28831", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-28831" }, { "cve": "CVE-2021-33574", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33574" }, { "cve": "CVE-2021-35942", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-35942" }, { "cve": "CVE-2021-38604", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-38604" }, { "cve": "CVE-2021-42373", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in Busybox\u0027s man applet leads to denial of service when a section name is supplied but no page argument is given.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42373" }, { "cve": "CVE-2021-42374", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds heap read in Busybox\u0027s unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42374" }, { "cve": "CVE-2021-42375", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An incorrect handling of a special element in Busybox\u0027s ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42375" }, { "cve": "CVE-2021-42376", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in Busybox\u0027s hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \\x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42376" }, { "cve": "CVE-2021-42377", "cwe": { "id": "CWE-763", "name": "Release of Invalid Pointer or Reference" }, "notes": [ { "category": "summary", "text": "An attacker-controlled pointer free in Busybox\u0027s hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the \u0026\u0026\u0026 string. This may be used for remote code execution under rare conditions of filtered command input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42377" }, { "cve": "CVE-2021-42378", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42378" }, { "cve": "CVE-2021-42379", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42379" }, { "cve": "CVE-2021-42380", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42380" }, { "cve": "CVE-2021-42381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42381" }, { "cve": "CVE-2021-42382", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42382" }, { "cve": "CVE-2021-42383", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42383" }, { "cve": "CVE-2021-42384", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42384" }, { "cve": "CVE-2021-42385", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42385" }, { "cve": "CVE-2021-42386", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-42386" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-1882", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1882" }, { "cve": "CVE-2022-2585", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s POSIX CPU timers functionality in the way a user creates and then deletes the timer in the non-leader thread of the program. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2585" }, { "cve": "CVE-2022-2588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2905", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2905" }, { "cve": "CVE-2022-3028", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3435", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3586" }, { "cve": "CVE-2022-4378", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A stack overflow flaw was found in the Linux kernel\u0027s SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4378" }, { "cve": "CVE-2022-4662", "cwe": { "id": "CWE-455", "name": "Non-exit on Failed Initialization" }, "notes": [ { "category": "summary", "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4662" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-21233", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21233" }, { "cve": "CVE-2022-23218", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-23218" }, { "cve": "CVE-2022-23219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-23219" }, { "cve": "CVE-2022-28391", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record\u0027s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal\u0027s colors.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-28391" }, { "cve": "CVE-2022-30065", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in Busybox 1.35-x\u0027s awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-30065" }, { "cve": "CVE-2022-39188", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39190", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39190" }, { "cve": "CVE-2022-40307", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-40307" }, { "cve": "CVE-2022-41222", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41222" }, { "cve": "CVE-2022-42703", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42703" }, { "cve": "CVE-2023-0179", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0179" }, { "cve": "CVE-2023-0394", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-1073", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-1073" }, { "cve": "CVE-2023-2898", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-2898" }, { "cve": "CVE-2023-3390", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3390" }, { "cve": "CVE-2023-3610", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3610" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3776", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3776" }, { "cve": "CVE-2023-4004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4015", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4015" }, { "cve": "CVE-2023-4128", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4147", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID allows a local user to crash or escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4147" }, { "cve": "CVE-2023-4273", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4273" }, { "cve": "CVE-2023-4527", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4527" }, { "cve": "CVE-2023-4806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4806" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-5156", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5156" }, { "cve": "CVE-2023-31248", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-31248" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-45863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.3.0 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109945851/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45863" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.